Vulnerability Details : CVE-2015-9231
iTerm2 3.x before 3.1.1 allows remote attackers to discover passwords by reading DNS queries. A new (default) feature was added to iTerm2 version 3.0.0 (and unreleased 2.9.x versions such as 2.9.20150717) that resulted in a potential information disclosure. In an attempt to see whether the text under the cursor (or selected text) was a URL, the text would be sent as an unencrypted DNS query. This has the potential to result in passwords and other sensitive information being sent in cleartext without the user being aware.
Vulnerability category: Information leak
Products affected by CVE-2015-9231
- cpe:2.3:a:iterm2:iterm2:3.0.0:preview:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.0.20160531:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.1.0:beta:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.1.0:beta10:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:2.9.20160510:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:2.9.20160426:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:2.9.20160422:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:2.9.20160313:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:2.9.20160206:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.1.0:beta5:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.1.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.1.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.1.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:2.9.20160113:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:2.9.20151229:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.1.0:beta8:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.1.0:beta6:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.1.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.0.1:preview:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:2.9.20160523:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:2.9.20160102:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:2.9.20151111:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.1.0:beta9:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.1.0:beta7:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:iterm2:iterm2:3.0.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-9231
0.41%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-9231
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2015-9231
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-9231
-
https://gitlab.com/gnachman/iterm2/issues/6050
Please disable 'Perform DNS lookups to check if URLs are valid?' by default (#6050) · Issues · George Nachman / iterm2 · GitLabExploit;Issue Tracking;Third Party Advisory
-
https://github.com/gnachman/iTerm2/commit/33ccaf61e34ef32ffc9d6b2be5dd218f6bb55f51
Fist swipe at removing DNS code · gnachman/iTerm2@33ccaf6 · GitHubThird Party Advisory
-
https://github.com/gnachman/iTerm2/commit/e4eb1063529deb575b75b396138d41554428d522
Disable DNS lookups on hover by default. Issue 6050 · gnachman/iTerm2@e4eb106 · GitHubIssue Tracking;Third Party Advisory
-
https://news.ycombinator.com/item?id=15286956
iTerm2: Please disable 'Perform DNS lookups to check if URLs are valid' | Hacker NewsIssue Tracking;Third Party Advisory
-
https://gitlab.com/gnachman/iterm2/wikis/dnslookupissue
dnslookupissue · Wiki · George Nachman / iterm2 · GitLabThird Party Advisory
-
https://gitlab.com/gnachman/iterm2/issues/3688
Smart selection is issuing dns requests (#3688) · Issues · George Nachman / iterm2 · GitLabIssue Tracking;Third Party Advisory
-
https://gitlab.com/gnachman/iterm2/issues/6068
Post-mortem for DNS lookups issue (#6068) · Issues · George Nachman / iterm2 · GitLabIssue Tracking;Third Party Advisory
-
https://gitlab.com/gnachman/iterm2/issues/5303
undesirable domain lookup behavior (#5303) · Issues · George Nachman / iterm2 · GitLabIssue Tracking;Third Party Advisory
Jump to