5
CVSSv2

CVE-2012-3519

Published: 26/08/2012 Updated: 22/08/2013
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

routerlist.c in Tor prior to 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote malicious users to obtain sensitive information about relay selection via a timing side-channel attack.

Vulnerable Product Search on Vulmon Subscribe to Product

tor tor

Vendor Advisories

Several vulnerabilities have been discovered in Tor, an online privacy tool CVE-2012-3518 Avoid an uninitialised memory read when reading a vote or consensus document that has an unrecognized flavour name This could lead to a remote crash, resulting in denial of service CVE-2012-3519 Try to leak less information about what relays a clie ...