CVE-2015-9231

CVSS V2 Medium 5 CVSS V3 High 7.5
Description
iTerm2 3.x before 3.1.1 allows remote attackers to discover passwords by reading DNS queries. A new (default) feature was added to iTerm2 version 3.0.0 (and unreleased 2.9.x versions such as 2.9.20150717) that resulted in a potential information disclosure. In an attempt to see whether the text under the cursor (or selected text) was a URL, the text would be sent as an unencrypted DNS query. This has the potential to result in passwords and other sensitive information being sent in cleartext without the user being aware.
Overview
  • CVE ID
  • CVE-2015-9231
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2017-09-20T20:29:00
  • Last Modified Date
  • 2017-10-05T17:54:07
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:iterm2:iterm2:2.9.20151111:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:2.9.20151229:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:2.9.20160102:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:2.9.20160113:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:2.9.20160206:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:2.9.20160313:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:2.9.20160422:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:2.9.20160426:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:2.9.20160510:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:2.9.20160523:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.0.0:preview:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.0.1:preview:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.0.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.0.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.0.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.0.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.0.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.0.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.0.20160531:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.1.0:beta:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.1.0:beta1:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.1.0:beta10:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.1.0:beta2:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.1.0:beta3:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.1.0:beta4:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.1.0:beta5:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.1.0:beta6:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.1.0:beta7:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.1.0:beta8:*:*:*:*:*:* 1 OR
cpe:2.3:a:iterm2:iterm2:3.1.0:beta9:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:P/I:N/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • NONE
  • Availability Impact
  • NONE
  • Base Score
  • 5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • NONE
  • Base Score
  • 7.5
  • Base Severity
  • HIGH
  • Exploitability Score
  • 3.9
  • Impact Score
  • 3.6
References
Reference URL Reference Tags
https://news.ycombinator.com/item?id=15286956 Issue Tracking Third Party Advisory
https://gitlab.com/gnachman/iterm2/wikis/dnslookupissue Third Party Advisory
https://gitlab.com/gnachman/iterm2/issues/6068 Issue Tracking Third Party Advisory
https://gitlab.com/gnachman/iterm2/issues/6050 Exploit Issue Tracking Third Party Advisory
https://gitlab.com/gnachman/iterm2/issues/5303 Issue Tracking Third Party Advisory
https://gitlab.com/gnachman/iterm2/issues/3688 Issue Tracking Third Party Advisory
https://github.com/gnachman/iTerm2/commit/e4eb1063529deb575b75b396138d41554428d522 Issue Tracking Third Party Advisory
https://github.com/gnachman/iTerm2/commit/33ccaf61e34ef32ffc9d6b2be5dd218f6bb55f51 Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 08:18:10 Added to TrackCVE
2022-12-02 21:13:43 2017-09-20T20:29Z 2017-09-20T20:29:00 CVE Published Date updated
2022-12-02 21:13:43 2017-10-05T17:54:07 CVE Modified Date updated
2022-12-02 21:13:43 Analyzed Vulnerability Status updated