Lucene search

K
cve[email protected]CVE-2015-9231
HistoryOct 03, 2022 - 4:16 p.m.

CVE-2015-9231

2022-10-0316:16:03
CWE-200
web.nvd.nist.gov
16
iterm2
cve-2015-9231
information disclosure
dns queries
security vulnerability

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.2 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.7%

iTerm2 3.x before 3.1.1 allows remote attackers to discover passwords by reading DNS queries. A new (default) feature was added to iTerm2 version 3.0.0 (and unreleased 2.9.x versions such as 2.9.20150717) that resulted in a potential information disclosure. In an attempt to see whether the text under the cursor (or selected text) was a URL, the text would be sent as an unencrypted DNS query. This has the potential to result in passwords and other sensitive information being sent in cleartext without the user being aware.

Affected configurations

NVD
Node
iterm2iterm2Match2.9.20151111
OR
iterm2iterm2Match2.9.20151229
OR
iterm2iterm2Match2.9.20160102
OR
iterm2iterm2Match2.9.20160113
OR
iterm2iterm2Match2.9.20160206
OR
iterm2iterm2Match2.9.20160313
OR
iterm2iterm2Match2.9.20160422
OR
iterm2iterm2Match2.9.20160426
OR
iterm2iterm2Match2.9.20160510
OR
iterm2iterm2Match2.9.20160523
OR
iterm2iterm2Match3.0.0
OR
iterm2iterm2Match3.0.0preview
OR
iterm2iterm2Match3.0.1preview
OR
iterm2iterm2Match3.0.2
OR
iterm2iterm2Match3.0.3
OR
iterm2iterm2Match3.0.4
OR
iterm2iterm2Match3.0.5
OR
iterm2iterm2Match3.0.6
OR
iterm2iterm2Match3.0.7
OR
iterm2iterm2Match3.0.8
OR
iterm2iterm2Match3.0.9
OR
iterm2iterm2Match3.0.10
OR
iterm2iterm2Match3.0.11
OR
iterm2iterm2Match3.0.12
OR
iterm2iterm2Match3.0.13
OR
iterm2iterm2Match3.0.14
OR
iterm2iterm2Match3.0.15
OR
iterm2iterm2Match3.0.20160531
OR
iterm2iterm2Match3.1.0
OR
iterm2iterm2Match3.1.0beta
OR
iterm2iterm2Match3.1.0beta1
OR
iterm2iterm2Match3.1.0beta10
OR
iterm2iterm2Match3.1.0beta2
OR
iterm2iterm2Match3.1.0beta3
OR
iterm2iterm2Match3.1.0beta4
OR
iterm2iterm2Match3.1.0beta5
OR
iterm2iterm2Match3.1.0beta6
OR
iterm2iterm2Match3.1.0beta7
OR
iterm2iterm2Match3.1.0beta8
OR
iterm2iterm2Match3.1.0beta9

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.2 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.7%

Related for CVE-2015-9231