{"id":"CVE-2017-16541","details":"Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.","modified":"2026-03-12T22:36:07.687781Z","published":"2017-11-04T18:29:00.187Z","related":["MGASA-2018-0480","SUSE-SU-2018:2890-1","SUSE-SU-2018:3247-1","SUSE-SU-2018:3591-1","SUSE-SU-2018:3591-2","openSUSE-SU-2018:3687-1","openSUSE-SU-2024:10600-1","openSUSE-SU-2024:10601-1","openSUSE-SU-2024:14572-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/101665"},{"type":"WEB","url":"http://www.securitytracker.com/id/1041610"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2692"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201810-01"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4327"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201811-13"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3403"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3458"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2693"},{"type":"REPORT","url":"https://trac.torproject.org/projects/tor/ticket/24052"},{"type":"REPORT","url":"https://www.bleepingcomputer.com/news/security/tormoil-vulnerability-leaks-real-ip-address-from-tor-browser-users/"},{"type":"REPORT","url":"https://www.wearesegment.com/research/tormoil-torbrowser-unspecified-critical-security-vulnerability/"},{"type":"REPORT","url":"https://blog.torproject.org/tor-browser-709-released"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1412081"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"7.0.9"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.5"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"fixed":"7.0.9"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-16541.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}]}