The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team of Tor claims this is an intended behavior and not a vulnerability
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2020-02-02 13:15
Updated : 2024-11-21 05:38
NVD link : CVE-2020-8516
Mitre link : CVE-2020-8516
CVE.ORG link : CVE-2020-8516
JSON object : View
Products Affected
torproject
- tor
CWE