Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2017-0377


Tor 0.3.x before 0.3.0.9 has a guard-selection algorithm that only considers the exit relay (not the exit relay's family), which might allow remote attackers to defeat intended anonymity properties by leveraging the existence of large families.


Published

2017-07-02T15:29:00.187

Last Modified

2025-04-20T01:37:25.860

Status

Deferred

Source

[email protected]

Severity

CVSSv3.0: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-200

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application torproject tor 0.3.0.1 Yes
Application torproject tor 0.3.0.2 Yes
Application torproject tor 0.3.0.3 Yes
Application torproject tor 0.3.0.4 Yes
Application torproject tor 0.3.0.5 Yes
Application torproject tor 0.3.0.6 Yes
Application torproject tor 0.3.0.7 Yes
Application torproject tor 0.3.0.8 Yes

References