Learn about CVE-2017-8822 affecting Tor versions before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9. Find out how this vulnerability compromises user anonymity and steps to mitigate it.
Tor versions before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9 are affected by a vulnerability known as TROVE-2017-012, impacting anonymity.
Understanding CVE-2017-8822
Previous versions of Tor had a vulnerability that allowed relays to select themselves as part of a circuit path, reducing anonymity.
What is CVE-2017-8822?
In Tor versions before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, relays with incomplete descriptor downloads could include themselves in a circuit path, compromising user anonymity.
The Impact of CVE-2017-8822
This vulnerability led to a decrease in the level of anonymity for Tor users, potentially exposing their identity and compromising their privacy.
Technical Details of CVE-2017-8822
Tor versions before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9 are susceptible to the following:
Vulnerability Description
Relays with incomplete descriptor downloads could select themselves in a circuit path, impacting user anonymity.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability allowed relays to choose themselves in a circuit path, compromising the anonymity of Tor users.
Mitigation and Prevention
To address CVE-2017-8822, consider the following steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates