Tor does not verify a nodes uptime and bandwidth advertisements, which allows remote attackers who operate a low resource node to make false claims of greater resources, which places the node into use for many circuits and compromises the anonymity of traffic sources and destinations.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tor | Tor | * | 0.1.1.26 (including) |
Tor | Ubuntu | dapper | * |
Tor | Ubuntu | edgy | * |
Tor | Ubuntu | feisty | * |
Tor | Ubuntu | gutsy | * |
Tor | Ubuntu | hardy | * |
Tor | Ubuntu | intrepid | * |