ID CVE-2016-3180
Summary Tor Browser Launcher (aka torbrowser-launcher) before 0.2.4, during the initial run, allows man-in-the-middle attackers to bypass the PGP signature verification and execute arbitrary code via a Trojan horse tar file and a signature file with the valid tarball and signature.
References
Vulnerable Configurations
  • cpe:2.3:a:tor_browser_launcher_project:tor_browser_launcher:0.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:tor_browser_launcher_project:tor_browser_launcher:0.2.3:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 28-02-2017 - 19:22)
Impact:
Exploitability:
CWE CWE-254
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
refmap via4
bid 96140
confirm https://github.com/micahflee/torbrowser-launcher/issues/229
Last major update 28-02-2017 - 19:22
Published 07-02-2017 - 17:59
Last modified 28-02-2017 - 19:22
Back to Top