CVE-2017-0377 — Sensitive Information Exposure in TOR
CWE-200 — Sensitive Information ExposureCWE-190 — Integer Overflow or Wraparound10 documents7 sources
Severity
7.5HIGHNVD
EPSS
0.5%
top 35.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 2
Latest updateMay 17
Description
Tor 0.3.x before 0.3.0.9 has a guard-selection algorithm that only considers the exit relay (not the exit relay's family), which might allow remote attackers to defeat intended anonymity properties by leveraging the existence of large families.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages2 packages
Patches
🔴Vulnerability Details
2📋Vendor Advisories
2💬Community
3Bugzilla▶
CVE-2017-0377 tor: improper implementation of guard-selection algorithm could weaken anonymity↗2017-07-04
Bugzilla▶
CVE-2017-0377 tor: improper implementation of guard-selection algorithm could weaken anonymity [epel-all]↗2017-07-04
Bugzilla▶
CVE-2017-0377 tor: improper implementation of guard-selection algorithm could weaken anonymity [fedora-all]↗2017-07-04