CVE-2021-39246

Severity CVSS v4.0:
Pending analysis
Type:
CWE-532 Information Exposure Through Log Files
Publication date:
24/09/2021
Last modified:
01/10/2021

Description

Tor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or collected by a rogue site within the Tor network).

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:torproject:tor_browser:*:*:*:*:*:*:*:* 10.5.6 (including)
cpe:2.3:a:torproject:tor_browser:11.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:torproject:tor_browser:11.0:alpha4:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*