Viscosity ViscosityHelper Symlink Attack Local Privilege Escalation

High Nessus Plugin ID 65700


The remote host is affected by a privilege escalation vulnerability.


The remote host has a version of Viscosity VPN client installed that has a path name validation flaw in the setuid-set ViscosityHelper binary. This flaw can be exploited to execute arbitrary code with root privileges.


Upgrade to Viscosity 1.4.2 or later.

See Also

Plugin Details

Severity: High

ID: 65700

File Name: macosx_viscosity_1_4_2.nasl

Version: $Revision: 1.3 $

Type: local

Agent: macosx

Published: 2013/03/27

Modified: 2016/11/28

Dependencies: 65699

Risk Information

Risk Factor: High


Base Score: 7.2

Temporal Score: 6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: x-cpe:/a:sparklabs:viscosity

Required KB Items: MacOSX/Viscosity/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/08/30

Vulnerability Publication Date: 2012/08/12

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Metasploit (Viscosity setuid-set ViscosityHelper Privilege Escalation)

Reference Information

CVE: CVE-2012-4284

BID: 55002

OSVDB: 84709

EDB-ID: 20485