Viscosity ViscosityHelper Symlink Attack Local Privilege Escalation

high Nessus Plugin ID 65700

Synopsis

The remote host is affected by a privilege escalation vulnerability.

Description

The remote host has a version of Viscosity VPN client installed that has a path name validation flaw in the setuid-set ViscosityHelper binary. This flaw can be exploited to execute arbitrary code with root privileges.

Solution

Upgrade to Viscosity 1.4.2 or later.

See Also

http://www.sparklabs.com/viscosity/releasenotes/

Plugin Details

Severity: High

ID: 65700

File Name: macosx_viscosity_1_4_2.nasl

Version: 1.4

Type: local

Agent: macosx

Published: 3/27/2013

Updated: 7/14/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/a:sparklabs:viscosity

Required KB Items: MacOSX/Viscosity/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/30/2012

Vulnerability Publication Date: 8/12/2012

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Metasploit (Viscosity setuid-set ViscosityHelper Privilege Escalation)

Reference Information

CVE: CVE-2012-4284

BID: 55002