CVE-2021-39246

Tor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or collected by a rogue site within the Tor network).
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:torproject:tor_browser:*:*:*:*:*:*:*:*
cpe:2.3:a:torproject:tor_browser:11.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:torproject:tor_browser:11.0:alpha4:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-09-24 19:15

Updated : 2024-02-28 18:48


NVD link : CVE-2021-39246

Mitre link : CVE-2021-39246

CVE.ORG link : CVE-2021-39246


JSON object : View

Products Affected

linux

  • linux_kernel

apple

  • macos

microsoft

  • windows

torproject

  • tor_browser
CWE
CWE-532

Insertion of Sensitive Information into Log File