Information disclosure in Tor - CVE-2011-4895
Published: December 23, 2011 / Updated: August 11, 2020
Tor
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.