First published: Mon Jan 25 2010(Updated: )
Tor 0.2.2.x before 0.2.2.7-alpha, when functioning as a directory mirror, does not prevent logging of the client IP address upon detection of erroneous client behavior, which might make it easier for local users to discover the identities of clients in opportunistic circumstances by reading log files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tor (The Onion Router) | =0.2.2.5-alpha | |
Tor (The Onion Router) | =0.2.2.5 | |
Tor (The Onion Router) | =0.2.2.1-alpha | |
Tor (The Onion Router) | =0.2.2.2 | |
Tor (The Onion Router) | =0.2.2.6-alpha | |
Tor (The Onion Router) | =0.2.2.3 | |
Tor (The Onion Router) | =0.2.2.3-alpha | |
Tor (The Onion Router) | =0.2.2.2-alpha | |
Tor (The Onion Router) | =0.2.2.6 | |
Tor (The Onion Router) | =0.2.2.1 | |
Tor (The Onion Router) | =0.2.2.4-alpha | |
Tor (The Onion Router) | =0.2.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0384 has a medium severity level as it allows logging of client IP addresses under certain conditions.
CVE-2010-0384 affects Tor versions 0.2.2.1-alpha through 0.2.2.6 and 0.2.2.5-alpha.
To fix CVE-2010-0384, upgrade to Tor version 0.2.2.7-alpha or later.
CVE-2010-0384 is a logging vulnerability that compromises client anonymity by logging IP addresses.
Yes, local users may exploit CVE-2010-0384 to identify clients by reading the log files.