routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2012-08-26T01:00:00
Updated: 2012-10-11T09:00:00
Reserved: 2012-06-14T00:00:00
Link: CVE-2012-3519
JSON object: View
NVD Information
Status : Modified
Published: 2012-08-26T03:17:44.153
Modified: 2013-08-22T03:56:41.763
Link: CVE-2012-3519
JSON object: View
Redhat Information
No data.
CWE