Vulnerabilities
Vulnerable Software
Google:  >> Tunnelblick  Security Vulnerabilities
Tunnelblick 3.3beta20 and earlier relies on argv[0] to determine the name of an appropriate (1) kernel module pathname or (2) executable file pathname, which allows local users to gain privileges via an execl system call.
CVSS Score
7.2
EPSS Score
0.259
Published
2012-08-26
Tunnelblick 3.3beta20 and earlier allows local users to gain privileges via an OpenVPN configuration file that specifies execution of a script upon occurrence of an OpenVPN event.
CVSS Score
6.9
EPSS Score
0.0
Published
2012-08-26
Race condition in Tunnelblick 3.3beta20 and earlier allows local users to kill unintended processes by waiting for a specific PID value to be assigned to a target process.
CVSS Score
1.2
EPSS Score
0.0
Published
2012-08-26
The errorExitIfAttackViaString function in Tunnelblick 3.3beta20 and earlier allows local users to delete arbitrary files by constructing a (1) symlink or (2) hard link, a different vulnerability than CVE-2012-3485.
CVSS Score
1.2
EPSS Score
0.0
Published
2012-08-26
Tunnelblick 3.3beta20 and earlier allows local users to gain privileges by using a crafted Info.plist file to control the gOkIfNotSecure value.
CVSS Score
4.4
EPSS Score
0.0
Published
2012-08-26
Race condition in the runScript function in Tunnelblick 3.3beta20 and earlier allows local users to gain privileges by replacing a script file.
CVSS Score
6.2
EPSS Score
0.002
Published
2012-08-26
Tunnelblick 3.3beta20 and earlier relies on a test for specific ownership and permissions to determine whether a program can be safely executed, which allows local users to bypass intended access restrictions and gain privileges via a (1) user-mountable image or (2) network share.
CVSS Score
7.2
EPSS Score
0.0
Published
2012-08-26


Contact Us

Shodan ® - All rights reserved