Tor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or collected by a rogue site within the Tor network).
References
Link | Resource |
---|---|
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-111.md | Exploit Third Party Advisory |
https://gitlab.torproject.org/tpo/core/tor/-/commit/80c404c4b79f3bcba3fc4585d4c62a62a04f3ed9 | Patch Vendor Advisory |
https://gitlab.torproject.org/tpo/core/tor/-/merge_requests/434 | Vendor Advisory |
https://sick.codes/sick-2021-111 | Exploit Third Party Advisory |
https://www.privacyaffairs.com/cve-2021-39246-tor-vulnerability | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
01 Oct 2021, 13:00
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 3.6
v3 : 6.1 |
CWE | CWE-532 | |
CPE | cpe:2.3:a:torproject:tor_browser:11.0:alpha2:*:*:*:*:*:* cpe:2.3:a:torproject:tor_browser:11.0:alpha4:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:a:torproject:tor_browser:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
References | (MISC) https://www.privacyaffairs.com/cve-2021-39246-tor-vulnerability - Third Party Advisory | |
References | (MISC) https://gitlab.torproject.org/tpo/core/tor/-/commit/80c404c4b79f3bcba3fc4585d4c62a62a04f3ed9 - Patch, Vendor Advisory | |
References | (MISC) https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-111.md - Exploit, Third Party Advisory | |
References | (MISC) https://sick.codes/sick-2021-111 - Exploit, Third Party Advisory | |
References | (MISC) https://gitlab.torproject.org/tpo/core/tor/-/merge_requests/434 - Vendor Advisory |
30 Sep 2021, 02:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Tor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or collected by a rogue site within the Tor network). |
24 Sep 2021, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-09-24 19:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-39246
Mitre link : CVE-2021-39246
CVE.ORG link : CVE-2021-39246
JSON object : View
Products Affected
apple
- macos
microsoft
- windows
torproject
- tor_browser
linux
- linux_kernel
CWE
CWE-532
Insertion of Sensitive Information into Log File