Information Exposure Affecting tor package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-TOR-546877
- published 6 Feb 2020
- disclosed 2 Feb 2020
Introduced: 2 Feb 2020
CVE-2020-8516 Open this link in a new tabHow to fix?
There is no fixed version for Debian:10 tor.
NVD Description
Note: Versions mentioned in the description apply only to the upstream tor package and not the tor package as distributed by Debian.
See How to fix? for Debian:10 relevant fixed versions and status.
The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team of Tor claims this is an intended behavior and not a vulnerability
References
- https://security-tracker.debian.org/tracker/CVE-2020-8516
- https://lists.torproject.org/pipermail/tor-dev/2020-February/014146.html
- https://lists.torproject.org/pipermail/tor-dev/2020-February/014147.html
- https://trac.torproject.org/projects/tor/ticket/33129
- https://www.hackerfactor.com/blog/index.php?/archives/868-Deanonymizing-Tor-Circuits.html