ID |
CVE-2017-8822
|
Summary |
In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, relays (that have incompletely downloaded descriptors) can pick themselves in a circuit path, leading to a degradation of anonymity, aka TROVE-2017-012. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:tor_project:tor:*:*:*:*:*:*:*:*
cpe:2.3:a:tor_project:tor:*:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
|
CVSS |
Base: | 4.3 (as of 21-12-2017 - 18:30) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-417 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
NONE |
NONE |
|
cvss-vector
via4
|
AV:N/AC:M/Au:N/C:P/I:N/A:N
|
refmap
via4
|
|
Last major update |
21-12-2017 - 18:30 |
Published |
03-12-2017 - 07:29 |
Last modified |
21-12-2017 - 18:30 |