漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
IPVanish 3.0.11 for macOS suffers from a root privilege escalation vulnerability. The `com.ipvanish.osx.vpnhelper` LaunchDaemon implements an insecure XPC service that could allow an attacker to execute arbitrary code as the root user. IPVanish uses a third-party library for converting `xpc_object_t` types in to `NSObject` types for sending XPC messages. When IPVanish establishes a new connection, the following XPC message is sent to the `com.ipvanish.osx.vpnhelper` LaunchDaemon. Because the XPC service itself does not validate an incoming connection, any application installed on the operating system can send it XPC messages. In the case of the "connect" message, an attacker could manipulate the `OpenVPNPath` to point at a malicious binary on the system. The `com.ipvanish.osx.vpnhelper` would receive the VPNHelperConnect command, and then execute the malicious binary as the root user.
漏洞信息
N/A
漏洞
N/A
漏洞
IPVanish for macOS 权限许可和访问控制问题漏洞
漏洞信息
IPVanish for macOS是一款基于macOS平台的用于匿名访问互联网的VPN软件。 基于macOS平台的IPVanish 3.0.11版本中存在提权漏洞,该漏洞源于‘com.ipvanish.osx.vpnhelper’LaunchDaemon实现了不安全的XPC服务。攻击者可利用该漏洞以root用户身份执行任意代码。
漏洞信息
N/A
漏洞
N/A