Tor Browser 9.0.7 on Windows 10 build 10586 is vulnerable to information disclosure. This could allow local attackers to bypass the intended anonymity feature and obtain information regarding the onion services visited by a local user. This can be accomplished by analyzing RAM memory even several hours after the local user used the product. This occurs because the product doesn't properly free memory.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.sciencedirect.com/science/article/pii/S0167404821001358 | Technical Description Third Party Advisory | 
| https://www.sciencedirect.com/science/article/pii/S0167404821001358 | Technical Description Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 06:34
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.sciencedirect.com/science/article/pii/S0167404821001358 - Technical Description, Third Party Advisory | 
Information
                Published : 2022-02-26 03:15
Updated : 2024-11-21 06:34
NVD link : CVE-2021-46702
Mitre link : CVE-2021-46702
CVE.ORG link : CVE-2021-46702
JSON object : View
Products Affected
                torproject
- tor
microsoft
- windows
CWE
                
                    
                        
                        CWE-404
                        
            Improper Resource Shutdown or Release
