| |
Vulnerability CVE-2011-4896
Published: 2011-12-22 Modified: 2012-02-13
Description: |
Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port. |
Type:
CWE-200 (Information Exposure)
CVSS2 => (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
4.3/10 |
2.9/10 |
8.6/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Medium |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
Partial |
None |
None |
References: |
https://blog.torproject.org/blog/tor-02224-alpha-out
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|