Bridge Enumeration Vulnerability in Tor

Bridge Enumeration Vulnerability in Tor

CVE-2011-4895 · MEDIUM Severity

AV:N/AC:M/AU:N/C:P/I:N/A:N

Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.

Learn more about our Web Application Penetration Testing UK.