← Back to CVEs
CVE-2019-9535
CRITICAL9.8
Description
A vulnerability exists in the way that iTerm2 integrates with tmux's control mode, which may allow an attacker to execute arbitrary commands by providing malicious output to the terminal. This affects versions of iTerm2 up to and including 3.3.5. This vulnerability may allow an attacker to execute arbitrary commands on their victim's computer by providing malicious output to the terminal. It could be exploited using command-line utilities that print attacker-controlled content.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published10/9/2019
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
iterm2:iterm2
Weaknesses (CWE)
CWE-349CWE-74
References
https://kb.cert.org/vuls/id/763073/(cret@cert.org)
https://blog.mozilla.org/security/2019/10/09/iterm2-critical-issue-moss-audit/(af854a3a-2127-422b-91ae-364da2661108)
https://groups.google.com/forum/#%21topic/iterm2-discuss/57k_AuLdQa4(af854a3a-2127-422b-91ae-364da2661108)
https://kb.cert.org/vuls/id/763073/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.