#VU8851 Information disclosure in Tor - CVE-2017-0380

 

#VU8851 Information disclosure in Tor - CVE-2017-0380

Published: October 9, 2017 / Updated: October 17, 2017


Vulnerability identifier: #VU8851
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-0380
CWE-ID: CWE-200
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Tor
Software vendor:
tor.eff.org

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists in the rend_service_intro_established() function in 'or/rendservice.c due to the system may log uninitialized stack contents when a certain hidden service error occurs while SafeLogging is disabled. A remote attacker can use an error message about the construction of an introduction point circuit and gain access to potentially sensitive information from uninitialized stack memory.


Remediation

The vulnerability is addressed in the following versions: 0.2.8.15, 0.2.9.12, 0.3.0.11.

External links