Anonymity Degradation Vulnerability in Tor Software by Tor Project
CVE-2017-8822

3.7LOW

What is CVE-2017-8822?

In certain versions of Tor, relays that have not fully downloaded descriptors can mistakenly include themselves in circuit paths. This behavior poses a risk by compromising user anonymity, as it allows potential attackers to deduce users' activities through circuit selection flaws. The vulnerability has been addressed in updated Tor releases that include security fixes to ensure safe relay selection and proper descriptor handling.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9 Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9

References

CVSS V3.1

Score:
3.7
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.