CVE-2011-4897Sensitive Information Exposure in TOR

Severity
4.3MEDIUMNVD
EPSS
0.3%
top 51.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 23
Latest updateMay 17

Description

Tor before 0.2.2.25-alpha, when configured as a relay without the Nickname configuration option, uses the local hostname as the Nickname value, which allows remote attackers to obtain potentially sensitive information by reading this value.

CVSS vector

AV:N/AC:M/C:P/I:N/A:NExploitability: 8.6 | Impact: 2.9

Affected Packages2 packages

Debiantorproject/tor< 0.2.2.27-beta-1+3
NVDtor/tor0.2.2.24+203

Patches

🔴Vulnerability Details

3
GHSA
GHSA-7h3x-gchg-chhg: Tor before 02022-05-17
OSV
CVE-2011-4897: Tor before 02011-12-23
CVEList
CVE-2011-4897: Tor before 02011-12-23

📋Vendor Advisories

1
Debian
CVE-2011-4897: tor - Tor before 0.2.2.25-alpha, when configured as a relay without the Nickname confi...2011

💬Community

3
Bugzilla
CVE-2011-2778 CVE-2011-4897 tor various flaws [epel-5]2012-12-11
Bugzilla
CVE-2011-4897 Tor Nickname information disclosure [fedora-all]2012-01-11
Bugzilla
CVE-2011-4897 Tor Nickname information disclosure2011-12-23
CVE-2011-4897 — Sensitive Information Exposure in TOR | cvebase