Tor Browser Launcher (aka torbrowser-launcher) before 0.2.4, during the initial run, allows man-in-the-middle attackers to bypass the PGP signature verification and execute arbitrary code via a Trojan horse tar file and a signature file with the valid tarball and signature.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securityfocus.com/bid/96140 | Third Party Advisory VDB Entry | 
| https://github.com/micahflee/torbrowser-launcher/issues/229 | Vendor Advisory | 
| http://www.securityfocus.com/bid/96140 | Third Party Advisory VDB Entry | 
| https://github.com/micahflee/torbrowser-launcher/issues/229 | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 02:49
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.securityfocus.com/bid/96140 - Third Party Advisory, VDB Entry | |
| References | () https://github.com/micahflee/torbrowser-launcher/issues/229 - Vendor Advisory | 
Information
                Published : 2017-02-07 17:59
Updated : 2025-04-20 01:37
NVD link : CVE-2016-3180
Mitre link : CVE-2016-3180
CVE.ORG link : CVE-2016-3180
JSON object : View
Products Affected
                tor_browser_launcher_project
- tor_browser_launcher
CWE
                
                    
                        
                        CWE-254
                        
            7PK - Security Features
