{ "schema_version": "1.4.0", "id": "GHSA-5x92-v869-v38r", "modified": "2022-05-17T04:56:41Z", "published": "2022-05-17T04:56:41Z", "aliases": [ "CVE-2012-3485" ], "details": "Tunnelblick 3.3beta20 and earlier relies on argv[0] to determine the name of an appropriate (1) kernel module pathname or (2) executable file pathname, which allows local users to gain privileges via an execl system call.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3485" }, { "type": "WEB", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-08/0122.html" }, { "type": "WEB", "url": "http://code.google.com/p/tunnelblick/issues/detail?id=212" }, { "type": "WEB", "url": "http://git.zx2c4.com/Pwnnel-Blicker/tree/pwnnel-blicker-for-kids.sh" }, { "type": "WEB", "url": "http://www.exploit-db.com/exploits/24578" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2012/08/14/1" } ], "database_specific": { "cwe_ids": [ "CWE-20" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2012-08-26T19:55:00Z" } }