CVE-2011-2768
https://notcve.org/view.php?id=CVE-2011-2768
Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected. Tor, antes de v0.2.2.34, cuando se configura como cliente o bridge, envía una cadena de certificado TLS como parte de una conexión saliente OR, lo que permite a relays remotos evitar la anonimidad intencionada cuando se determina un conjunto de guardas de entrada seleccionadas por el cliente o bridge. • http://www.debian.org/security/2011/dsa-2331 https://blog.torproject.org/blog/tor-02234-released-security-patches • CWE-264: Permissions, Privileges, and Access Controls •