{"containers":{"cna":{"affected":[{"product":"Tor","vendor":"n/a","versions":[{"status":"affected","version":"Tor"}]}],"datePublic":"2017-07-02T00:00:00.000Z","descriptions":[{"lang":"en","value":"Tor 0.3.x before 0.3.0.9 has a guard-selection algorithm that only considers the exit relay (not the exit relay's family), which might allow remote attackers to defeat intended anonymity properties by leveraging the existence of large families."}],"problemTypes":[{"descriptions":[{"description":"privacy bypass","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-07-02T14:57:01.000Z","orgId":"79363d38-fa19-49d1-9214-5f28da3f3ac5","shortName":"debian"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://trac.torproject.org/projects/tor/ticket/22753"},{"tags":["x_refsource_CONFIRM"],"url":"https://security-tracker.debian.org/CVE-2017-0377"},{"tags":["x_refsource_CONFIRM"],"url":"https://blog.torproject.org/blog/tor-0309-released-security-update-clients"},{"tags":["x_refsource_CONFIRM"],"url":"https://blog.torproject.org/blog/tor-0314-alpha-released-security-update-clients"},{"tags":["x_refsource_CONFIRM"],"url":"https://github.com/torproject/tor/commit/665baf5ed5c6186d973c46cdea165c0548027350"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@debian.org","ID":"CVE-2017-0377","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Tor","version":{"version_data":[{"version_value":"Tor"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Tor 0.3.x before 0.3.0.9 has a guard-selection algorithm that only considers the exit relay (not the exit relay's family), which might allow remote attackers to defeat intended anonymity properties by leveraging the existence of large families."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"privacy bypass"}]}]},"references":{"reference_data":[{"name":"https://trac.torproject.org/projects/tor/ticket/22753","refsource":"CONFIRM","url":"https://trac.torproject.org/projects/tor/ticket/22753"},{"name":"https://security-tracker.debian.org/CVE-2017-0377","refsource":"CONFIRM","url":"https://security-tracker.debian.org/CVE-2017-0377"},{"name":"https://blog.torproject.org/blog/tor-0309-released-security-update-clients","refsource":"CONFIRM","url":"https://blog.torproject.org/blog/tor-0309-released-security-update-clients"},{"name":"https://blog.torproject.org/blog/tor-0314-alpha-released-security-update-clients","refsource":"CONFIRM","url":"https://blog.torproject.org/blog/tor-0314-alpha-released-security-update-clients"},{"name":"https://github.com/torproject/tor/commit/665baf5ed5c6186d973c46cdea165c0548027350","refsource":"CONFIRM","url":"https://github.com/torproject/tor/commit/665baf5ed5c6186d973c46cdea165c0548027350"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T13:03:56.989Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://trac.torproject.org/projects/tor/ticket/22753"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security-tracker.debian.org/CVE-2017-0377"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://blog.torproject.org/blog/tor-0309-released-security-update-clients"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://blog.torproject.org/blog/tor-0314-alpha-released-security-update-clients"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/torproject/tor/commit/665baf5ed5c6186d973c46cdea165c0548027350"}]}]},"cveMetadata":{"assignerOrgId":"79363d38-fa19-49d1-9214-5f28da3f3ac5","assignerShortName":"debian","cveId":"CVE-2017-0377","datePublished":"2017-07-02T15:00:00.000Z","dateReserved":"2016-11-29T00:00:00.000Z","dateUpdated":"2024-08-05T13:03:56.989Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}