CVE-2017-0377Sensitive Information Exposure in TOR

Severity
7.5HIGHNVD
EPSS
0.5%
top 35.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 2
Latest updateMay 17

Description

Tor 0.3.x before 0.3.0.9 has a guard-selection algorithm that only considers the exit relay (not the exit relay's family), which might allow remote attackers to defeat intended anonymity properties by leveraging the existence of large families.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5torproject/torTor
NVDtorproject/tor8 versions+7

Patches

🔴Vulnerability Details

2
GHSA
GHSA-vxgf-qp88-w686: Tor 02022-05-17
CVEList
CVE-2017-0377: Tor 02017-07-02

📋Vendor Advisories

2
Red Hat
vim: Integer overflow at a u_read_undo memory allocation site2017-02-13
Debian
CVE-2017-0377: tor - Tor 0.3.x before 0.3.0.9 has a guard-selection algorithm that only considers the...2017

💬Community

3
Bugzilla
CVE-2017-0377 tor: improper implementation of guard-selection algorithm could weaken anonymity2017-07-04
Bugzilla
CVE-2017-0377 tor: improper implementation of guard-selection algorithm could weaken anonymity [epel-all]2017-07-04
Bugzilla
CVE-2017-0377 tor: improper implementation of guard-selection algorithm could weaken anonymity [fedora-all]2017-07-04
CVE-2017-0377 — Sensitive Information Exposure in TOR | cvebase