CVE-2019-6724

The barracudavpn component of the Barracuda VPN Client prior to version 5.0.2.7 for Linux, macOS, and OpenBSD runs as a privileged process and can allow an unprivileged local attacker to load a malicious library, resulting in arbitrary code executing as root.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:barracuda:vpn_client:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:openbsd:openbsd:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-03-21 16:01

Updated : 2023-12-10 12:59


NVD link : CVE-2019-6724

Mitre link : CVE-2019-6724

CVE.ORG link : CVE-2019-6724


JSON object : View

Products Affected

barracuda

  • vpn_client

linux

  • linux_kernel

openbsd

  • openbsd

apple

  • mac_os_x
CWE
CWE-426

Untrusted Search Path