CVE Vulnerabilities

CVE-2020-8516

Published: Feb 02, 2020 | Modified: May 17, 2024
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team of Tor claims this is an intended behavior and not a vulnerability

Affected Software

Name Vendor Start Version End Version
Tor Torproject * 0.4.1.8 (including)
Tor Torproject 0.4.2.0 (including) 0.4.2.6 (including)
Tor Ubuntu bionic *
Tor Ubuntu eoan *
Tor Ubuntu groovy *
Tor Ubuntu hirsute *
Tor Ubuntu impish *
Tor Ubuntu kinetic *
Tor Ubuntu lunar *
Tor Ubuntu mantic *
Tor Ubuntu trusty *
Tor Ubuntu xenial *

References