Lucene search

K

Tunnelblick Security Vulnerabilities

cve
cve

CVE-2012-3484

Tunnelblick 3.3beta20 and earlier relies on a test for specific ownership and permissions to determine whether a program can be safely executed, which allows local users to bypass intended access restrictions and gain privileges via a (1) user-mountable image or (2) network...

7.4AI Score

0.0004EPSS

2012-08-26 07:55 PM
21
cve
cve

CVE-2012-3483

Race condition in the runScript function in Tunnelblick 3.3beta20 and earlier allows local users to gain privileges by replacing a script...

7.3AI Score

0.0004EPSS

2012-08-26 07:55 PM
14
cve
cve

CVE-2012-4676

The errorExitIfAttackViaString function in Tunnelblick 3.3beta20 and earlier allows local users to delete arbitrary files by constructing a (1) symlink or (2) hard link, a different vulnerability than...

6.5AI Score

0.0004EPSS

2012-08-26 07:55 PM
22
cve
cve

CVE-2012-3485

Tunnelblick 3.3beta20 and earlier relies on argv[0] to determine the name of an appropriate (1) kernel module pathname or (2) executable file pathname, which allows local users to gain privileges via an execl system...

6.6AI Score

0.002EPSS

2012-08-26 07:55 PM
17
cve
cve

CVE-2012-3487

Race condition in Tunnelblick 3.3beta20 and earlier allows local users to kill unintended processes by waiting for a specific PID value to be assigned to a target...

7AI Score

0.0004EPSS

2012-08-26 07:55 PM
14
cve
cve

CVE-2012-3486

Tunnelblick 3.3beta20 and earlier allows local users to gain privileges via an OpenVPN configuration file that specifies execution of a script upon occurrence of an OpenVPN...

7.4AI Score

0.0004EPSS

2012-08-26 07:55 PM
20
cve
cve

CVE-2012-4677

Tunnelblick 3.3beta20 and earlier allows local users to gain privileges by using a crafted Info.plist file to control the gOkIfNotSecure...

7.3AI Score

0.0004EPSS

2012-08-26 07:55 PM
22