Tor Browser Launcher (aka torbrowser-launcher) before 0.2.4, during the initial run, allows man-in-the-middle attackers to bypass the PGP signature verification and execute arbitrary code via a Trojan horse tar file and a signature file with the valid tarball and signature.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/96140 | Third Party Advisory VDB Entry |
https://github.com/micahflee/torbrowser-launcher/issues/229 | Vendor Advisory |
http://www.securityfocus.com/bid/96140 | Third Party Advisory VDB Entry |
https://github.com/micahflee/torbrowser-launcher/issues/229 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/96140 - Third Party Advisory, VDB Entry | |
References | () https://github.com/micahflee/torbrowser-launcher/issues/229 - Vendor Advisory |
Information
Published : 2017-02-07 17:59
Updated : 2024-11-21 02:49
NVD link : CVE-2016-3180
Mitre link : CVE-2016-3180
CVE.ORG link : CVE-2016-3180
JSON object : View
Products Affected
tor_browser_launcher_project
- tor_browser_launcher
CWE
CWE-254
7PK - Security Features