Vulnerability CVE-2017-16541: Information

Description

Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.

Severity: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Published: Nov. 4, 2017
Modified: April 18, 2022
Error type identifier: CWE-200

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
firefoxsisyphus62.0.3-alt1125.0.2-alt1ALT-PU-2018-2423-1214118Fixed
firefoxp1062.0.3-alt1118.0.2-alt0.p10.1ALT-PU-2018-2423-1214118Fixed
firefoxp962.0.3-alt1105.0.1-alt0.c9.1ALT-PU-2018-2423-1214118Fixed
firefoxp862.0.3-alt0.M80P.168.0.1-alt0.M80P.1ALT-PU-2018-2479-1214248Fixed
firefoxc10f162.0.3-alt1112.0.2-alt0.p10.1ALT-PU-2018-2423-1214118Fixed
firefoxc9f262.0.3-alt1105.0.1-alt0.c9.1ALT-PU-2018-2423-1214118Fixed
firefoxc760.6.1-alt0.M70C.160.8.0-alt0.M70C.1ALT-PU-2019-1726-1218597Fixed
firefox-esrsisyphus60.2.0-alt1115.10.0-alt1ALT-PU-2018-2304-1212803Fixed
firefox-esrp1060.2.0-alt1115.10.0-alt1ALT-PU-2018-2304-1212803Fixed
firefox-esrp960.2.0-alt1102.11.0-alt0.c9.1ALT-PU-2018-2304-1212803Fixed
firefox-esrp860.2.0-alt0.M80P.168.4.1-alt0.M80P.1ALT-PU-2018-2343-1212912Fixed
firefox-esrc10f160.2.0-alt1115.9.1-alt0.c10.1ALT-PU-2018-2304-1212803Fixed
firefox-esrc9f260.2.0-alt1102.12.0-alt0.c9.1ALT-PU-2018-2304-1212803Fixed
thunderbirdsisyphus60.3.0-alt1115.9.0-alt1ALT-PU-2018-2669-1210777Fixed
thunderbirdp1060.3.0-alt1115.9.0-alt1ALT-PU-2018-2669-1210777Fixed
thunderbirdp960.3.0-alt1102.11.0-alt0.c9.1ALT-PU-2018-2669-1210777Fixed
thunderbirdp860.7.2-alt0.M80P.160.8.0-alt0.M80P.1ALT-PU-2019-2196-1216874Fixed
thunderbirdc10f160.3.0-alt1115.9.0-alt0.c10.1ALT-PU-2018-2669-1210777Fixed
thunderbirdc9f260.3.0-alt1102.11.0-alt0.c9.1ALT-PU-2018-2669-1210777Fixed
thunderbirdc760.8.0-alt0.M70C.160.8.0-alt0.M70C.1ALT-PU-2019-2345-1234994Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://www.wearesegment.com/research/tormoil-torbrowser-unspecified-critical-security-vulnerability/
  • Issue Tracking
  • Third Party Advisory
https://www.bleepingcomputer.com/news/security/tormoil-vulnerability-leaks-real-ip-address-from-tor-browser-users/
  • Issue Tracking
  • Third Party Advisory
https://trac.torproject.org/projects/tor/ticket/24052
  • Issue Tracking
  • Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1412081
  • Exploit
  • Issue Tracking
  • Third Party Advisory
https://blog.torproject.org/tor-browser-709-released
  • Issue Tracking
  • Vendor Advisory
101665
  • Broken Link
1041610
  • Broken Link
RHSA-2018:2693
  • Third Party Advisory
RHSA-2018:2692
  • Third Party Advisory
GLSA-201810-01
  • Third Party Advisory
DSA-4327
  • Third Party Advisory
RHSA-2018:3403
  • Third Party Advisory
RHSA-2018:3458
  • Third Party Advisory
[debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
  • Mailing List
  • Third Party Advisory
GLSA-201811-13
  • Third Party Advisory
    1. Configuration 1

      cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

      Configuration 2

      cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*

      Configuration 3

      cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

      cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*