Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Google Subscribe
Filtered by product Tunnelblick
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2012-3485 1 Google 1 Tunnelblick 2013-12-12 7.2 HIGH N/A
Tunnelblick 3.3beta20 and earlier relies on argv[0] to determine the name of an appropriate (1) kernel module pathname or (2) executable file pathname, which allows local users to gain privileges via an execl system call.
CVE-2012-3484 1 Google 1 Tunnelblick 2012-08-26 7.2 HIGH N/A
Tunnelblick 3.3beta20 and earlier relies on a test for specific ownership and permissions to determine whether a program can be safely executed, which allows local users to bypass intended access restrictions and gain privileges via a (1) user-mountable image or (2) network share.
CVE-2012-3483 1 Google 1 Tunnelblick 2012-08-26 6.2 MEDIUM N/A
Race condition in the runScript function in Tunnelblick 3.3beta20 and earlier allows local users to gain privileges by replacing a script file.
CVE-2012-3487 1 Google 1 Tunnelblick 2012-08-26 1.2 LOW N/A
Race condition in Tunnelblick 3.3beta20 and earlier allows local users to kill unintended processes by waiting for a specific PID value to be assigned to a target process.
CVE-2012-4676 1 Google 1 Tunnelblick 2012-08-26 1.2 LOW N/A
The errorExitIfAttackViaString function in Tunnelblick 3.3beta20 and earlier allows local users to delete arbitrary files by constructing a (1) symlink or (2) hard link, a different vulnerability than CVE-2012-3485.
CVE-2012-4677 1 Google 1 Tunnelblick 2012-08-26 4.4 MEDIUM N/A
Tunnelblick 3.3beta20 and earlier allows local users to gain privileges by using a crafted Info.plist file to control the gOkIfNotSecure value.
CVE-2012-3486 1 Google 1 Tunnelblick 2012-08-26 6.9 MEDIUM N/A
Tunnelblick 3.3beta20 and earlier allows local users to gain privileges via an OpenVPN configuration file that specifies execution of a script upon occurrence of an OpenVPN event.