In Golden Frog VyprVPN before 2.15.0.5828 for macOS, the vyprvpnservice launch daemon has an unprotected XPC service that allows attackers to update the underlying OpenVPN configuration and the arguments passed to the OpenVPN binary when executed. An attacker can abuse this vulnerability by forcing the VyprVPN application to load a malicious dynamic library every time a new connection is made.
References
Link | Resource |
---|---|
https://github.com/VerSprite/research/blob/master/advisories/VS-2017-007.md | Third Party Advisory |
https://github.com/VerSprite/research/blob/master/advisories/VS-2017-007.md | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/VerSprite/research/blob/master/advisories/VS-2017-007.md - Third Party Advisory |
Information
Published : 2017-12-20 23:29
Updated : 2024-11-21 03:18
NVD link : CVE-2017-17809
Mitre link : CVE-2017-17809
CVE.ORG link : CVE-2017-17809
JSON object : View
Products Affected
goldenfrog
- vyprvpn
CWE
CWE-426
Untrusted Search Path