Thursday, December 26, 2024
HomeSecurity ToolsTor Browser 10.0.18 Released - Fixed The Flaw That Let Websites...

Tor Browser 10.0.18 Released – Fixed The Flaw That Let Websites Tracking Users

Published on

SIEM as a Service

Tor is one of the biggest open-source software, its networks have virtual tunnels that generally enable people and different groups to enhance their privacy and security on the Internet.

Recently Tor has released its Tor Browser 10.0.18, and the main motive of this release is to fix all the countless bugs, which also include a vulnerability that enables different websites to keep track of their users by fingerprinting the installed application.

We all know that Tor administers Internet traffic with the help of an overlay network that is free worldwide.

- Advertisement - SIEM as a Service

But, this network consists of nearly seven thousand relays, that help in concealing a user’s location as well as usage from people who are conducting network surveillance or traffic examination.

Scheme Flooding vulnerability

Scheme flooding is a vulnerability, that uses different custom URL schemes as an attack vector. According to the experts, this vulnerability generally enables the actors to identify that which applications have been installed by the users.

Once the experts identified the application successfully, then they use all the data and information of the installed app on the user’s computer. 

And the main motive of doing this is that they want to assign a permanent unique identifier in the user’s computer so that they can use the system even if the users switch browsers just by using incognito mode or a VPN.

Not only this but scheme flooding also allows third-party tracking in a different browser. However, this exploit generally helps the hackers to track down the usage of users’ browsers like Google Chrome, Safari, even the Tor browser as well.

Thorough Changelog

The experts have mentioned a full changelog for Tor 10.0.18, which is given below:-

All Platforms

  • Update Tor to 0.4.5.9

Android

  • Update Fenix to 89.1.1
  • Update NoScript to 11.2.8
  • Bug 40055: Rebase android-components patches on 75.0.22 for Fenix 89
  • Bug 40165: Announce v2 onion service deprecation on about:tor
  • Bug 40166: Hide “Normal” tab (again) and Sync tab in TabTray
  • Bug 40167: Hide “Save to Collection” in menu
  • Bug 40169: Rebase fenix patches to fenix v89.1.1
  • Bug 40170: Error building tor-browser-89.1.1-10.5-1
  • Bug 40432: Prevent probing installed applications
  • Bug 40470: Rebase 10.0 patches onto 89.0

Build System

  • Android
    • Bug 40290: Update components for mozilla89-based Fenix

According to the security researchers, as well as Tor, this new version updates Tor to 0.4.5.9, and it consists of all the important security fixes. 

While this new release also updates Firefox to 89.1.1, and NoScript to 11.2.8 and all this new version includes the important security updates to Firefox for Android.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Indonesia Government Data Breach – Hackers Leaked 82 GB of Sensitive Data Online

Hackers have reportedly infiltrated and extracted a vast 82 GB of sensitive data from...

IBM AIX TCP/IP Vulnerability Lets Attackers Exploit to Launch Denial of Service Attack

IBM has issued a security bulletin warning of two vulnerabilities in its AIX operating...

Apache Auth-Bypass Vulnerability Lets Attackers Gain Control Over HugeGraph-Server

The Apache Software Foundation has issued a security alert regarding a critical vulnerability...

USA Launched Cyber Attack on Chinese Technology Firms

The Chinese National Internet Emergency Center (CNIE) has revealed two significant cases of cyber...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

ConvoC2 – A Red Teamers Tool To Execute Commands on Hacked Hosts Via Microsoft Teams

A stealthy Command-and-Control (C2) infrastructure Red Team tool named ConvoC2 showcases how cyber attackers...

Wireshark 4.4.2 Released: What’s New!

The Wireshark Foundation has officially announced the release of Wireshark 4.4.2, the latest version...

Kali Linux 2024.3 Released With New Hacking Tools

Kali Linux 2024.3, the most recent iteration of Offensive Security's highly regarded Debian-based distribution...