Tuesday, October 27, 17:56
Home security iTerm macOS Terminal: Found with 7 critical vulnerability

iTerm macOS Terminal: Found with 7 critical vulnerability

iTermAccording to researchers, the iTerm macOS terminal app, an open-source application, which replaces the built-in terminal app of Mac devices, was found to be a critical one vulnerability. This vulnerability has been known for 7 years. Has been named CVE-2019-9535. It was discovered by Mozilla Open Source Support Program in one of its tests.

The iTerm 2 The app processes a large amount of data, which is not protected. In addition, it is used by many developers. This is a very popular application. Given the large amount of information it manages and the importance of this information (this is very confidential) data), detection of any vulnerability is of the utmost importance.

According to a blog post by Mozilla, the issue is very important. it is about a RCE vulnerability in tmux integration. The malicious hackers could exploit the vulnerability to execute various commands.

What can they do? hackers;

Hackers could use vulnerability for any malicious activity. For example, they could link the terminal app to the malicious one server SSH or use the tail-f attribute to track a malicious file and link it to the app. In addition, they could link the app to some malware website.

Usually, this vulnerability requires some tricks to be used by hackers. However, according to them researchers, iTerm vulnerability can be used much easier. All versions of iTerm up to 3.3.5 are vulnerable to the error. The team behind iTerm fixed the problem in the new 2.3.6 release. The experts recommend that all users of the app install the update in order to protect themselves from vulnerability. Users can download the update themselves or update it software using the installed applications menu.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Absent Mia
Absent Miahttps://www.secnews.gr
Being your self, in a world that constantly tries to change you, is your greatest achievement

LIVE NEWS

How to install a .watchface file on Apple Watch

The Apple Watch lets you customize the faces of the watch to display all kinds of useful information. But did you know ...

The five biggest data breaches of the 21st century

Data is becoming more and more sought after as our daily lives become more digitized. The technology giants that monopolize data are ...

Microsoft is limiting the availability of Windows 10 20H2

Microsoft is currently restricting the availability of Windows 10 20H2 to provide all users who want to ...

How to enable the new Chrome Read more feature

The latest version of Google Chrome browser, v86, released earlier this month, contains a secret feature called Read ...

How to choose a custom color for the Start menu

Starting with the October 2020 update, Windows 10 is the default on a theme that removes bright colors from ...

NASA telescope discovers drinking water on the moon

Eleven years ago, a spacecraft changed our view of the moon forever. The data collected by ...

Microsoft: Enhances password spray attack detection capabilities

Microsoft has significantly improved the ability to detect password spray attacks in the Azure Active Directory (Azure AD) and has reached the point ...

How to prevent companies from finding our phone number

In the age of advertising, the more user information is known the more convenient it is for companies. And in particular, the ...

Violation in a psychotherapy clinic led to blackmail of patients

Two years ago, a cyber attack took place in a Finnish psychotherapy clinic, which resulted in data theft and ransom demand. Now,...

Australia: Enhances cybersecurity and privacy!

The Government of New South Wales in Australia has set up a task force to strengthen cybersecurity and protection ...