MEDIUM · 4.3

CVE-2011-4894

Tor before 0.2.2.34, when configured as a bridge, uses direct DirPort access instead of a Tor TLS connection for a directory fetch, which makes it easier for remote attackers to enumerate bridges by o...

Vulnerability Description

Tor before 0.2.2.34, when configured as a bridge, uses direct DirPort access instead of a Tor TLS connection for a directory fetch, which makes it easier for remote attackers to enumerate bridges by observing DirPort connections.

CVSS Score

4.3

MEDIUM

AV:N/AC:M/Au:N/C:P/I:N/A:N
Confidentiality
PARTIAL
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
TorTor<= 0.2.2.33

Related Weaknesses (CWE)

References

FAQ

What is CVE-2011-4894?

CVE-2011-4894 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Tor before 0.2.2.34, when configured as a bridge, uses direct DirPort access instead of a Tor TLS connection for a directory fetch, which makes it easier for remote attackers to enumerate bridges by o...

How severe is CVE-2011-4894?

CVE-2011-4894 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2011-4894?

Check the references section above for vendor advisories and patch information. Affected products include: Tor Tor.