Unknown
CVE-2015-9231
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
CVE-2015-9231
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
iTerm2 3.x before 3.1.1 allows remote attackers to discover passwords by reading DNS queries. A new (default) feature was added to iTerm2 version 3.0.0 (and unreleased 2.9.x versions such as 2.9.20150717) that resulted in a potential information disclosure. In an attempt to see whether the text under the cursor (or selected text) was a URL, the text would be sent as an unencrypted DNS query. This has the potential to result in passwords and other sensitive information being sent in cleartext without the user being aware.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- iterm2 2.9.20151111,
- iterm2 2.9.20151229,
- iterm2 2.9.20160102,
- iterm2 2.9.20160113,
- iterm2 2.9.20160206,
- iterm2 2.9.20160313,
- iterm2 2.9.20160422,
- iterm2 2.9.20160426,
- iterm2 2.9.20160510,
- iterm2 2.9.20160523,
- iterm2 3.0.0,
- iterm2 3.0.1,
- iterm2 3.0.10,
- iterm2 3.0.11,
- iterm2 3.0.12,
- iterm2 3.0.13,
- iterm2 3.0.14,
- iterm2 3.0.15,
- iterm2 3.0.2,
- iterm2 3.0.20160531,
- iterm2 3.0.3,
- iterm2 3.0.4,
- iterm2 3.0.5,
- iterm2 3.0.6,
- iterm2 3.0.7,
- iterm2 3.0.8,
- iterm2 3.0.9,
- iterm2 3.1.0
References
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: