Tunnelblick
Sign in to watchby Google
CVEs (7)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2012-3485 | 0.05 | — | 0.28 | Aug 26, 2012 | Tunnelblick 3.3beta20 and earlier relies on argv[0] to determine the name of an appropriate (1) kernel module pathname or (2) executable file pathname, which allows local users to gain privileges via an execl system call. | ||
| CVE-2012-3483 | 0.03 | — | 0.01 | Aug 26, 2012 | Race condition in the runScript function in Tunnelblick 3.3beta20 and earlier allows local users to gain privileges by replacing a script file. | ||
| CVE-2012-4677 | 0.00 | — | 0.00 | Aug 26, 2012 | Tunnelblick 3.3beta20 and earlier allows local users to gain privileges by using a crafted Info.plist file to control the gOkIfNotSecure value. | ||
| CVE-2012-4676 | 0.00 | — | 0.00 | Aug 26, 2012 | The errorExitIfAttackViaString function in Tunnelblick 3.3beta20 and earlier allows local users to delete arbitrary files by constructing a (1) symlink or (2) hard link, a different vulnerability than CVE-2012-3485. | ||
| CVE-2012-3487 | 0.00 | — | 0.00 | Aug 26, 2012 | Race condition in Tunnelblick 3.3beta20 and earlier allows local users to kill unintended processes by waiting for a specific PID value to be assigned to a target process. | ||
| CVE-2012-3486 | 0.00 | — | 0.00 | Aug 26, 2012 | Tunnelblick 3.3beta20 and earlier allows local users to gain privileges via an OpenVPN configuration file that specifies execution of a script upon occurrence of an OpenVPN event. | ||
| CVE-2012-3484 | 0.00 | — | 0.00 | Aug 26, 2012 | Tunnelblick 3.3beta20 and earlier relies on a test for specific ownership and permissions to determine whether a program can be safely executed, which allows local users to bypass intended access restrictions and gain privileges via a (1) user-mountable image or (2) network share. |