CVE-2011-2769Sensitive Information Exposure in TOR

Severity
4.3MEDIUMNVD
EPSS
0.3%
top 50.29%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 23
Latest updateMay 17

Description

Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values.

CVSS vector

AV:N/AC:M/C:P/I:N/A:NExploitability: 8.6 | Impact: 2.9

Affected Packages2 packages

Debiantorproject/tor< 0.2.2.34-1+3
NVDtor/tor0.2.2.33+204

Patches

🔴Vulnerability Details

3
GHSA
GHSA-8686-9px5-f96f: Tor before 02022-05-17
CVEList
CVE-2011-2769: Tor before 02011-12-23
OSV
CVE-2011-2769: Tor before 02011-12-23

📋Vendor Advisories

1
Debian
CVE-2011-2769: tor - Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_...2011

💬Community

3
Bugzilla
CVE-2011-2768 CVE-2011-2769 tor: multiple flaws corrected in 0.2.2.34 [epel-5]2011-10-28
Bugzilla
CVE-2011-2768 CVE-2011-2769 tor: multiple flaws corrected in 0.2.2.34 [fedora-all]2011-10-28
Bugzilla
CVE-2011-2768 CVE-2011-2769 tor: multiple flaws corrected in 0.2.2.342011-10-28
CVE-2011-2769 — Sensitive Information Exposure in TOR | cvebase