Lucene search

K
GoogleTunnelblick

7 matches found

CVE
CVE
added 2012/08/26 7:55 p.m.47 views

CVE-2012-4676

The errorExitIfAttackViaString function in Tunnelblick 3.3beta20 and earlier allows local users to delete arbitrary files by constructing a (1) symlink or (2) hard link, a different vulnerability than CVE-2012-3485.

1.2CVSS6.4AI score0.2587EPSS
CVE
CVE
added 2012/08/26 7:55 p.m.45 views

CVE-2012-3486

Tunnelblick 3.3beta20 and earlier allows local users to gain privileges via an OpenVPN configuration file that specifies execution of a script upon occurrence of an OpenVPN event.

6.9CVSS6.8AI score0.00033EPSS
CVE
CVE
added 2012/08/26 7:55 p.m.40 views

CVE-2012-4677

Tunnelblick 3.3beta20 and earlier allows local users to gain privileges by using a crafted Info.plist file to control the gOkIfNotSecure value.

4.4CVSS6.7AI score0.00017EPSS
CVE
CVE
added 2012/08/26 7:55 p.m.38 views

CVE-2012-3483

Race condition in the runScript function in Tunnelblick 3.3beta20 and earlier allows local users to gain privileges by replacing a script file.

6.2CVSS6.7AI score0.00235EPSS
CVE
CVE
added 2012/08/26 7:55 p.m.37 views

CVE-2012-3484

Tunnelblick 3.3beta20 and earlier relies on a test for specific ownership and permissions to determine whether a program can be safely executed, which allows local users to bypass intended access restrictions and gain privileges via a (1) user-mountable image or (2) network share.

7.2CVSS6.8AI score0.00025EPSS
CVE
CVE
added 2012/08/26 7:55 p.m.36 views

CVE-2012-3485

Tunnelblick 3.3beta20 and earlier relies on argv[0] to determine the name of an appropriate (1) kernel module pathname or (2) executable file pathname, which allows local users to gain privileges via an execl system call.

7.2CVSS6.5AI score0.2587EPSS
CVE
CVE
added 2012/08/26 7:55 p.m.30 views

CVE-2012-3487

Race condition in Tunnelblick 3.3beta20 and earlier allows local users to kill unintended processes by waiting for a specific PID value to be assigned to a target process.

1.2CVSS6.5AI score0.00023EPSS