Описание
Tunnelblick 3.3beta20 and earlier relies on argv[0] to determine the name of an appropriate (1) kernel module pathname or (2) executable file pathname, which allows local users to gain privileges via an execl system call.
Tunnelblick 3.3beta20 and earlier relies on argv[0] to determine the name of an appropriate (1) kernel module pathname or (2) executable file pathname, which allows local users to gain privileges via an execl system call.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2012-3485
- http://archives.neohapsis.com/archives/fulldisclosure/2012-08/0122.html
- http://code.google.com/p/tunnelblick/issues/detail?id=212
- http://git.zx2c4.com/Pwnnel-Blicker/tree/pwnnel-blicker-for-kids.sh
- http://www.exploit-db.com/exploits/24578
- http://www.openwall.com/lists/oss-security/2012/08/14/1
Связанные уязвимости
nvd
больше 13 лет назад
Tunnelblick 3.3beta20 and earlier relies on argv[0] to determine the name of an appropriate (1) kernel module pathname or (2) executable file pathname, which allows local users to gain privileges via an execl system call.