Tor Browser 9.0.7 on Windows 10 build 10586 is vulnerable to information disclosure. This could allow local attackers to bypass the intended anonymity feature and obtain information regarding the onion services visited by a local user. This can be accomplished by analyzing RAM memory even several hours after the local user used the product. This occurs because the product doesn't properly free memory.
References
Link | Resource |
---|---|
https://www.sciencedirect.com/science/article/pii/S0167404821001358 | Technical Description Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
10 Mar 2022, 16:50
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.sciencedirect.com/science/article/pii/S0167404821001358 - Technical Description, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 5.5 |
CWE | CWE-404 | |
CPE | cpe:2.3:a:torproject:tor:9.0.7:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
26 Feb 2022, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-02-26 03:15
Updated : 2024-02-04 22:29
NVD link : CVE-2021-46702
Mitre link : CVE-2021-46702
CVE.ORG link : CVE-2021-46702
JSON object : View
Products Affected
torproject
- tor
microsoft
- windows
CWE
CWE-404
Improper Resource Shutdown or Release