CVE-2014-5117 | Date: (C)2014-08-06 (M)2023-12-22 |
Tor before 0.2.4.23 and 0.2.5 before 0.2.5.6-alpha maintains a circuit after an inbound RELAY_EARLY cell is received by a client, which makes it easier for remote attackers to conduct traffic-confirmation attacks by using the pattern of RELAY and RELAY_EARLY cells as a means of communicating information about hidden service names.
CVSS Score and Metrics +CVSS Score and Metrics -CVSS V2 Severity: |
CVSS Score : 5.8 |
Exploit Score: 8.6 |
Impact Score: 4.9 |
|
CVSS V2 Metrics: |
Access Vector: NETWORK |
Access Complexity: MEDIUM |
Authentication: NONE |
Confidentiality: PARTIAL |
Integrity: PARTIAL |
Availability: NONE |
| |