MEDIUM · 5.0

CVE-2012-3519

routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information abou...

Vulnerability Description

routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack.

CVSS Score

5.0

MEDIUM

AV:N/AC:L/Au:N/C:P/I:N/A:N
Confidentiality
PARTIAL
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
TorTor<= 0.2.2.37

Related Weaknesses (CWE)

References

FAQ

What is CVE-2012-3519?

CVE-2012-3519 is a vulnerability with a CVSS score of 5.0 (MEDIUM). routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information abou...

How severe is CVE-2012-3519?

CVE-2012-3519 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2012-3519?

Check the references section above for vendor advisories and patch information. Affected products include: Tor Tor.