Computer Security
[EN] securityvulns.ru
no-pyccku



tor information discosure
Published:31.10.2011
Source:BUGTRAQ
SecurityVulns ID:12008
Type:m-i-t-m
Level:5/10
Description:Combined attacks may be used to deaninmize user.
Affected:TOR : tor 0.2
CVE:CVE-2011-2769 (Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values.)
 CVE-2011-2768 (Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 2331-1] tor security update (31.10.2011)
Discuss:Read or add your comments to this news (0 comments)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod

 
 



Rating@Mail.ru