CVE-2012-3519
Debian Security Advisory 2548-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack.
routerlist.c en Tor anterior a v0.2.2.38 utiliza una cantidad diferente de tiempo para la iteración relay-list dependiendo de que (relay) sea elegido, lo cual podría permitir a atacantes remotos obtener información sensible sobre la selección del (relay) a través de un ataque de tiempo al canal lateral (timing side-channel attack).
Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected. Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values. Various other vulnerabilities have been addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2012-06-14 CVE Reserved
- 2012-08-26 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://openwall.com/lists/oss-security/2012/08/21/6 | Mailing List | |
http://secunia.com/advisories/50583 | Third Party Advisory | |
https://gitweb.torproject.org/tor.git/commit/308f6dad20675c42b29862f4269ad1fbfb00dc9a | X_refsource_confirm | |
https://gitweb.torproject.org/tor.git/commit/d48cebc5e498b0ae673635f40fc57cdddab45d5b | X_refsource_confirm | |
https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html | Mailing List | |
https://trac.torproject.org/projects/tor/ticket/6537 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html | 2013-08-22 | |
http://security.gentoo.org/glsa/glsa-201301-03.xml | 2013-08-22 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tor Search vendor "Tor" | Tor Search vendor "Tor" for product "Tor" | <= 0.2.2.37 Search vendor "Tor" for product "Tor" and version " <= 0.2.2.37" | - |
Affected
|