Google

Tunnelblick

7 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 25.87%
  • Published 26.08.2012 19:55:02
  • Last modified 11.04.2025 00:51:21

Tunnelblick 3.3beta20 and earlier relies on argv[0] to determine the name of an appropriate (1) kernel module pathname or (2) executable file pathname, which allows local users to gain privileges via an execl system call.

  • EPSS 0.03%
  • Published 26.08.2012 19:55:02
  • Last modified 11.04.2025 00:51:21

Tunnelblick 3.3beta20 and earlier allows local users to gain privileges via an OpenVPN configuration file that specifies execution of a script upon occurrence of an OpenVPN event.

  • EPSS 0.02%
  • Published 26.08.2012 19:55:02
  • Last modified 11.04.2025 00:51:21

Race condition in Tunnelblick 3.3beta20 and earlier allows local users to kill unintended processes by waiting for a specific PID value to be assigned to a target process.

Exploit
  • EPSS 0.04%
  • Published 26.08.2012 19:55:02
  • Last modified 11.04.2025 00:51:21

The errorExitIfAttackViaString function in Tunnelblick 3.3beta20 and earlier allows local users to delete arbitrary files by constructing a (1) symlink or (2) hard link, a different vulnerability than CVE-2012-3485.

  • EPSS 0.02%
  • Published 26.08.2012 19:55:02
  • Last modified 11.04.2025 00:51:21

Tunnelblick 3.3beta20 and earlier allows local users to gain privileges by using a crafted Info.plist file to control the gOkIfNotSecure value.

  • EPSS 0.24%
  • Published 26.08.2012 19:55:01
  • Last modified 11.04.2025 00:51:21

Race condition in the runScript function in Tunnelblick 3.3beta20 and earlier allows local users to gain privileges by replacing a script file.

  • EPSS 0.03%
  • Published 26.08.2012 19:55:01
  • Last modified 11.04.2025 00:51:21

Tunnelblick 3.3beta20 and earlier relies on a test for specific ownership and permissions to determine whether a program can be safely executed, which allows local users to bypass intended access restrictions and gain privileges via a (1) user-mounta...