Tor 0.3.x before 0.3.0.9 has a guard-selection algorithm that only considers the exit relay (not the exit relay's family), which might allow remote attackers to defeat intended anonymity properties by leveraging the existence of large families.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://trac.torproject.org/projects/tor/ticket/22753 | issue tracking vendor advisory |
https://security-tracker.debian.org/CVE-2017-0377 | third party advisory |
https://blog.torproject.org/blog/tor-0309-released-security-update-clients | release notes vendor advisory |
https://blog.torproject.org/blog/tor-0314-alpha-released-security-update-clients | release notes vendor advisory |
https://github.com/torproject/tor/commit/665baf5ed5c6186d973c46cdea165c0548027350 | third party advisory patch |