First published: Mon Feb 26 2007(Updated: )
Tor does not verify a node's uptime and bandwidth advertisements, which allows remote attackers who operate a low resource node to make false claims of greater resources, which places the node into use for many circuits and compromises the anonymity of traffic sources and destinations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tor (The Onion Router) | <=0.1.1.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1103 is considered a moderate severity vulnerability that affects the Tor network.
To mitigate CVE-2007-1103, update your Tor software to a version later than 0.1.1.26 where this issue has been addressed.
CVE-2007-1103 can be exploited by remote attackers to compromise the anonymity of users by introducing false node resource claims.
CVE-2007-1103 affects all versions of Tor up to and including 0.1.1.26.
CVE-2007-1103 can lead to a degradation of anonymity for Tor users by allowing low resource nodes to handle more traffic than they should.