CVE-2011-4894
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
23/12/2011
Last modified:
11/04/2025
Description
Tor before 0.2.2.34, when configured as a bridge, uses direct DirPort access instead of a Tor TLS connection for a directory fetch, which makes it easier for remote attackers to enumerate bridges by observing DirPort connections.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:* | 0.2.2.33 (including) | |
cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page