Threat Watch

Stay informed of cybersecurity news & events

iTerm2 macOS App Found to Have Seven-Year-Old Flaw

Share on facebook
Share on twitter
Share on linkedin

An audit sponsored by Mozilla led to the discovery of a critical flaw (CVE-2019-9535) within iTerm2, a well known open-source terminal emulator app that serves the same purpose as the native terminal macOS app but for those that use the command line. In a description from Mozilla, it sounds like the flaw could be exploited in many unknown ways. “An attacker who can produce output to the terminal can, in many cases, execute commands on the user’s computer,” stated Tom Ritter from Mozilla. The bug has been in the tmux integration feature of iTerm2 for around seven years. Mozilla wanted to support the audit of iTerm2 because it is very popular with developers and admins and they used the Mozilla Open-Source Support Program (MOSS), and the audit itself was performed by Radically Open Security. Although user interaction is necessary for it to be exploited, the flaw could be extremely dangerous because it can be exploited by commands. “This is a serious security issue because in some circumstances it could allow an attacker to execute commands on your machine when you view a file or otherwise receive input, they have crafted in iTerm2,” mention the developers from iTerm2. A patch was released yesterday, October 9th, in version 3.3.6 of iTerm2.

ANALYST NOTES

Anyone using iTerm2 should update to the latest version of iTerm2 immediately. Since there are numerous ways to exploit the flaw it makes it even more dangerous for developers and admins to protect themselves.

Contact Support

Please complete the form below and a member of our support team will respond as quickly as possible.