CVE-2021-39246
Severity CVSS v4.0:
Pending analysis
Type:
CWE-532
Information Exposure Through Log Files
Publication date:
24/09/2021
Last modified:
01/10/2021
Description
Tor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or collected by a rogue site within the Tor network).
Impact
Base Score 3.x
6.10
Severity 3.x
MEDIUM
Base Score 2.0
3.60
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:torproject:tor_browser:*:*:*:*:*:*:*:* | 10.5.6 (including) | |
| cpe:2.3:a:torproject:tor_browser:11.0:alpha2:*:*:*:*:*:* | ||
| cpe:2.3:a:torproject:tor_browser:11.0:alpha4:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-111.md
- https://gitlab.torproject.org/tpo/core/tor/-/commit/80c404c4b79f3bcba3fc4585d4c62a62a04f3ed9
- https://gitlab.torproject.org/tpo/core/tor/-/merge_requests/434
- https://sick.codes/sick-2021-111
- https://www.privacyaffairs.com/cve-2021-39246-tor-vulnerability



