Medium severity6.5NVD Advisory· Published Nov 4, 2017· Updated May 13, 2026
CVE-2017-16541
CVE-2017-16541
Description
Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.
Affected products
16cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
15- bugzilla.mozilla.org/show_bug.cginvdExploitIssue TrackingThird Party Advisory
- access.redhat.com/errata/RHSA-2018:2692nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2018:2693nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2018:3403nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2018:3458nvdThird Party Advisory
- blog.torproject.org/tor-browser-709-releasednvdIssue TrackingVendor Advisory
- lists.debian.org/debian-lts-announce/2018/11/msg00011.htmlnvdMailing ListThird Party Advisory
- security.gentoo.org/glsa/201810-01nvdThird Party Advisory
- security.gentoo.org/glsa/201811-13nvdThird Party Advisory
- trac.torproject.org/projects/tor/ticket/24052nvdIssue TrackingVendor Advisory
- www.bleepingcomputer.com/news/security/tormoil-vulnerability-leaks-real-ip-address-from-tor-browser-users/nvdIssue TrackingThird Party Advisory
- www.debian.org/security/2018/dsa-4327nvdThird Party Advisory
- www.wearesegment.com/research/tormoil-torbrowser-unspecified-critical-security-vulnerability/nvdIssue TrackingThird Party Advisory
- www.securityfocus.com/bid/101665nvdBroken Link
- www.securitytracker.com/id/1041610nvdBroken Link
News mentions
0No linked articles in our index yet.