Computer Security
[EN] securityvulns.ru
no-pyccku

  

tor information discosure
Published:31.10.2011
Source:
SecurityVulns ID:12008
Type:m-i-t-m
Threat Level:
5/10
Description:Combined attacks may be used to deaninmize user.
Affected:TOR : tor 0.2
CVE:CVE-2011-2769 (Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values.)
 CVE-2011-2768 (Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 2331-1] tor security update (31.10.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod

 
 



Rating@Mail.ru