Tor 'Relay Early' Traffic Confirmation Attack Vunerability oct14 (Windows)

Summary
This host is installed with Tor browser and is prone to information disclosure vulnerability.
Impact
Successful exploitation will allow attackers to manipulate protocol headers and perform traffic confirmation attack. Impact Level: Application
Solution
Upgrade to version 0.2.4.23 or 0.2.5.6-alpha or later, For updates refer to https://www.torproject.org
Insight
Flaw exists due to an error in the handling of sequences of Relay and Relay Early commands.
Affected
Tor browser before 0.2.4.23 and 0.2.5 before 0.2.5.6-alpha on Windows
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References