Описание
Tor Browser Launcher (aka torbrowser-launcher) before 0.2.4, during the initial run, allows man-in-the-middle attackers to bypass the PGP signature verification and execute arbitrary code via a Trojan horse tar file and a signature file with the valid tarball and signature.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 0.2.4-1 |
| cosmic | not-affected | 0.2.4-1 |
| devel | not-affected | 0.2.4-1 |
| esm-apps/bionic | not-affected | 0.2.4-1 |
| esm-apps/xenial | released | 0.2.4-1 |
| esm-infra-legacy/trusty | DNE | |
| precise | DNE | |
| precise/esm | DNE | |
| trusty | DNE |
Показывать по
Ссылки на источники
6.8 Medium
CVSS2
8.1 High
CVSS3
Связанные уязвимости
Tor Browser Launcher (aka torbrowser-launcher) before 0.2.4, during the initial run, allows man-in-the-middle attackers to bypass the PGP signature verification and execute arbitrary code via a Trojan horse tar file and a signature file with the valid tarball and signature.
Tor Browser Launcher (aka torbrowser-launcher) before 0.2.4, during th ...
Tor Browser Launcher (aka torbrowser-launcher) before 0.2.4, during the initial run, allows man-in-the-middle attackers to bypass the PGP signature verification and execute arbitrary code via a Trojan horse tar file and a signature file with the valid tarball and signature.
6.8 Medium
CVSS2
8.1 High
CVSS3