Tunnelblick 3.3beta20 and earlier relies on a test for specific ownership and permissions to determine whether a program can be safely executed, which allows local users to bypass intended access restrictions and gain privileges via a (1) user-mountable image or (2) network share.
Max CVSS
7.2
EPSS Score
0.04%
Published
2012-08-26
Updated
2012-08-27

CVE-2012-3485

Public exploit
Tunnelblick 3.3beta20 and earlier relies on argv[0] to determine the name of an appropriate (1) kernel module pathname or (2) executable file pathname, which allows local users to gain privileges via an execl system call.
Max CVSS
7.2
EPSS Score
0.21%
Published
2012-08-26
Updated
2013-12-13
Tunnelblick 3.3beta20 and earlier allows local users to gain privileges via an OpenVPN configuration file that specifies execution of a script upon occurrence of an OpenVPN event.
Max CVSS
6.9
EPSS Score
0.04%
Published
2012-08-26
Updated
2012-08-27
Race condition in the runScript function in Tunnelblick 3.3beta20 and earlier allows local users to gain privileges by replacing a script file.
Max CVSS
6.2
EPSS Score
0.05%
Published
2012-08-26
Updated
2012-08-27
Tunnelblick 3.3beta20 and earlier allows local users to gain privileges by using a crafted Info.plist file to control the gOkIfNotSecure value.
Max CVSS
4.4
EPSS Score
0.04%
Published
2012-08-26
Updated
2012-08-27
Race condition in Tunnelblick 3.3beta20 and earlier allows local users to kill unintended processes by waiting for a specific PID value to be assigned to a target process.
Max CVSS
1.2
EPSS Score
0.04%
Published
2012-08-26
Updated
2012-08-27
The errorExitIfAttackViaString function in Tunnelblick 3.3beta20 and earlier allows local users to delete arbitrary files by constructing a (1) symlink or (2) hard link, a different vulnerability than CVE-2012-3485.
Max CVSS
1.2
EPSS Score
0.04%
Published
2012-08-26
Updated
2012-08-27
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!