Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5x92-v869-v38r

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Tunnelblick 3.3beta20 and earlier relies on argv[0] to determine the name of an appropriate (1) kernel module pathname or (2) executable file pathname, which allows local users to gain privileges via an execl system call.

Tunnelblick 3.3beta20 and earlier relies on argv[0] to determine the name of an appropriate (1) kernel module pathname or (2) executable file pathname, which allows local users to gain privileges via an execl system call.

EPSS

Процентиль: 96%
0.27757
Средний

Дефекты

CWE-20

Связанные уязвимости

nvd
больше 13 лет назад

Tunnelblick 3.3beta20 and earlier relies on argv[0] to determine the name of an appropriate (1) kernel module pathname or (2) executable file pathname, which allows local users to gain privileges via an execl system call.

EPSS

Процентиль: 96%
0.27757
Средний

Дефекты

CWE-20