7.5
CVSSv3

CVE-2017-0377

Published: 02/07/2017 Updated: 14/07/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Tor 0.3.x prior to 0.3.0.9 has a guard-selection algorithm that only considers the exit relay (not the exit relay's family), which might allow remote malicious users to defeat intended anonymity properties by leveraging the existence of large families.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

torproject tor 0.3.0.5

torproject tor 0.3.0.4

torproject tor 0.3.0.3

torproject tor 0.3.0.2

torproject tor 0.3.0.8

torproject tor 0.3.0.6

torproject tor 0.3.0.1

torproject tor 0.3.0.7

Vendor Advisories

A security issue has been found in Tor <= 0308, which could make it easier to eavesdrop on Tor users' traffic When choosing which guard to use for a circuit, Tor avoids using a node that is in the same family that the exit node it selected, but this check was accidentally removed in 030 ...