First published: Sun Aug 26 2012(Updated: )
Tunnelblick 3.3beta20 and earlier relies on argv[0] to determine the name of an appropriate (1) kernel module pathname or (2) executable file pathname, which allows local users to gain privileges via an execl system call.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Tunnelblick | <=3.3beta20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.