Summary
This host is installed with Tor browser
and is prone to information disclosure vulnerability.
Impact
Successful exploitation will allow attackers
to manipulate protocol headers and perform traffic confirmation attack.
Impact Level: Application
Solution
Upgrade to version 0.2.4.23 or
0.2.5.6-alpha or later, For updates refer to https://www.torproject.org
Insight
Flaw exists due to an error
in the handling of sequences of Relay and Relay Early commands.
Affected
Tor browser before 0.2.4.23 and 0.2.5
before 0.2.5.6-alpha on Windows
Detection
Get the installed version with the help of
detect NVT and check the version is vulnerable or not.
References
Severity
Classification
-
CVE CVE-2014-5117 -
CVSS Base Score: 5.8
AV:N/AC:M/Au:N/C:P/I:P/A:N
Related Vulnerabilities
- Adobe Flash Player Unspecified Cross-Site Scripting Vulnerability June-2011 (Linux)
- APC PowerChute Business Edition Unspecified Cross Site Scripting Vulnerability
- Adobe Reader 'file://' URL Information Disclosure Vulnerability Feb07 (Linux)
- Adobe Flash Media Server Video Stream Capture Security Issue
- Apache Tomcat Remote Code Execution Vulnerability - Sep14