ID |
CVE-2020-8516
|
Sažetak |
The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team of Tor claims this is an intended behavior and not a vulnerability |
Reference |
|
CVSS |
Base: | 5.0 |
Impact: | 2.9 |
Exploitability: | 10.0 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
LOW |
NONE |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
PARTIAL |
NONE |
NONE |
|
CVSS vektor |
AV:N/AC:L/Au:N/C:P/I:N/A:N |
Zadnje važnije ažuriranje |
04-08-2024 - 10:15 |
Objavljeno |
02-02-2020 - 13:15 |