First published: Wed Nov 08 2017(Updated: )
Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. Upstream issue: <a href="https://trac.torproject.org/projects/tor/ticket/24052">https://trac.torproject.org/projects/tor/ticket/24052</a> References: <a href="https://blog.torproject.org/tor-browser-709-released">https://blog.torproject.org/tor-browser-709-released</a> <a href="https://www.bleepingcomputer.com/news/security/tormoil-vulnerability-leaks-real-ip-address-from-tor-browser-users/">https://www.bleepingcomputer.com/news/security/tormoil-vulnerability-leaks-real-ip-address-from-tor-browser-users/</a> <a href="https://www.wearesegment.com/research/tormoil-torbrowser-unspecified-critical-security-vulnerability/">https://www.wearesegment.com/research/tormoil-torbrowser-unspecified-critical-security-vulnerability/</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Tor Browser | <7.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1510816 is critical due to its potential to compromise user anonymity.
To fix REDHAT-BUG-1510816, update your Tor Browser to version 7.0.9 or later.
REDHAT-BUG-1510816 affects Tor Browser on macOS and Linux platforms.
The exploit vector for REDHAT-BUG-1510816 involves file:// mishandling in Firefox that allows site-crafted attacks to leak IP addresses.
The implications of REDHAT-BUG-1510816 for user security include the risk of exposing real IP addresses, potentially undermining anonymity efforts.