routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack.
References
Configurations
History
No history.
Information
Published : 2012-08-26 03:17
Updated : 2024-02-04 18:16
NVD link : CVE-2012-3519
Mitre link : CVE-2012-3519
CVE.ORG link : CVE-2012-3519
JSON object : View
Products Affected
tor
- tor
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor