Tor does not verify a node's uptime and bandwidth advertisements, which allows remote attackers who operate a low resource node to make false claims of greater resources, which places the node into use for many circuits and compromises the anonymity of traffic sources and destinations.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2007-02-26T17:00:00

Updated: 2008-11-15T10:00:00

Reserved: 2007-02-26T00:00:00


Link: CVE-2007-1103

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2007-02-26T17:28:00.000

Modified: 2008-11-15T06:43:18.127


Link: CVE-2007-1103

JSON object: View

cve-icon Redhat Information

No data.