CVE-2017-0377 Vulnerability Details

  /     /     /  

CVE-2017-0377 Metadata Quick Info

CVE Published: 02/07/2017 | CVE Updated: 05/08/2024 | CVE Year: 2017
Source: debian | Vendor: n/a | Product: Tor
Status : PUBLISHED

CVE-2017-0377 Description

Tor 0.3.x before 0.3.0.9 has a guard-selection algorithm that only considers the exit relay (not the exit relay\'s family), which might allow remote attackers to defeat intended anonymity properties by leveraging the existence of large families.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID:
CWE Name: privacy bypass
Source: n/a

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).