** DISPUTED ** The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team of Tor claims this is an intended behavior and not a vulnerability.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-02-02 13:15
Updated : 2021-07-21 11:39
NVD link : CVE-2020-8516
Mitre link : CVE-2020-8516
JSON object : View
Products Affected
torproject
- tor
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
