The barracudavpn component of the Barracuda VPN Client prior to version 5.0.2.7 for Linux, macOS, and OpenBSD runs as a privileged process and can allow an unprivileged local attacker to load a malicious library, resulting in arbitrary code executing as root.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://campus.barracuda.com/product/networkaccessclient/doc/78154147/release-notes-barracuda-vpn-client-for-macos/ - Vendor Advisory | |
References | () https://blog.mirch.io/2019/02/14/cve-2019-6724-barracuda-vpn-client-privilege-escalation-on-linux-and-macos/ - Exploit, Third Party Advisory | |
References | () https://campus.barracuda.com/product/networkaccessclient/doc/78154149/release-notes-barracuda-vpn-client-for-linux/ - Vendor Advisory |
Information
Published : 2019-03-21 16:01
Updated : 2024-11-21 04:47
NVD link : CVE-2019-6724
Mitre link : CVE-2019-6724
CVE.ORG link : CVE-2019-6724
JSON object : View
Products Affected
openbsd
- openbsd
linux
- linux_kernel
apple
- mac_os_x
barracuda
- vpn_client
CWE
CWE-426
Untrusted Search Path