Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v82 for Linux could allow an authenticated, local attacker to run arbitrary code with elevated privileges. The openvpn_launcher.64 binary is setuid root. This binary executes /opt/pia/openvpn-64/openvpn, passing the parameters provided from the command line. Care was taken to programmatically disable potentially dangerous openvpn parameters; however, the --route-pre-down parameter can be used. This parameter accepts an arbitrary path to a script/program to be executed when OpenVPN exits. The --script-security parameter also needs to be passed to allow for this action to be taken, and --script-security is not currently in the disabled parameter list. A local unprivileged user can pass a malicious script/binary to the --route-pre-down option, which will be executed as root when openvpn is stopped.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
London Trust Media Private Internet Access Client 权限许可和访问控制问题漏洞
Vulnerability Description
London Trust Media Private Internet Access(PIA)Client是一款用于匿名访问互联网的VPN(虚拟专用网络)客户端应用程序。 基于Linux平台的London Trust Media PIA VPN Client v82版本中存在安全漏洞。本地攻击者可利用该漏洞以提升的权限执行任意代码。
CVSS Information
N/A
Vulnerability Type
N/A