The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team of Tor claims this is an intended behavior and not a vulnerability
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T10:03:45.879Z
Reserved: 2020-02-02T00:00:00
Link: CVE-2020-8516

No data.

Status : Modified
Published: 2020-02-02T13:15:10.903
Modified: 2024-11-21T05:38:58.863
Link: CVE-2020-8516

No data.