CVE-2019-6724

The barracudavpn component of the Barracuda VPN Client prior to version 5.0.2.7 for Linux, macOS, and OpenBSD runs as a privileged process and can allow an unprivileged local attacker to load a malicious library, resulting in arbitrary code executing as root.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:barracuda:vpn_client:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:openbsd:openbsd:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:47

Type Values Removed Values Added
References () http://campus.barracuda.com/product/networkaccessclient/doc/78154147/release-notes-barracuda-vpn-client-for-macos/ - Vendor Advisory () http://campus.barracuda.com/product/networkaccessclient/doc/78154147/release-notes-barracuda-vpn-client-for-macos/ - Vendor Advisory
References () https://blog.mirch.io/2019/02/14/cve-2019-6724-barracuda-vpn-client-privilege-escalation-on-linux-and-macos/ - Exploit, Third Party Advisory () https://blog.mirch.io/2019/02/14/cve-2019-6724-barracuda-vpn-client-privilege-escalation-on-linux-and-macos/ - Exploit, Third Party Advisory
References () https://campus.barracuda.com/product/networkaccessclient/doc/78154149/release-notes-barracuda-vpn-client-for-linux/ - Vendor Advisory () https://campus.barracuda.com/product/networkaccessclient/doc/78154149/release-notes-barracuda-vpn-client-for-linux/ - Vendor Advisory

Information

Published : 2019-03-21 16:01

Updated : 2024-11-21 04:47


NVD link : CVE-2019-6724

Mitre link : CVE-2019-6724

CVE.ORG link : CVE-2019-6724


JSON object : View

Products Affected

openbsd

  • openbsd

linux

  • linux_kernel

apple

  • mac_os_x

barracuda

  • vpn_client
CWE
CWE-426

Untrusted Search Path