First published: Sun Aug 26 2012(Updated: )
Tunnelblick 3.3beta20 and earlier allows local users to gain privileges via an OpenVPN configuration file that specifies execution of a script upon occurrence of an OpenVPN event.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Tunnelblick | <=3.3beta20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3486 is classified as a high severity vulnerability due to the potential for local users to gain elevated privileges.
To fix CVE-2012-3486, update to a version of Tunnelblick later than 3.3beta20 that addresses this privilege escalation issue.
CVE-2012-3486 affects local users of Tunnelblick versions 3.3beta20 and earlier.
The attack vector for CVE-2012-3486 involves manipulating an OpenVPN configuration file to execute arbitrary scripts.
CVE-2012-3486 targets Tunnelblick, specifically versions up to and including 3.3beta20.