Описание
The barracudavpn component of the Barracuda VPN Client prior to version 5.0.2.7 for Linux, macOS, and OpenBSD runs as a privileged process and can allow an unprivileged local attacker to load a malicious library, resulting in arbitrary code executing as root.
Ссылки
- Vendor Advisory
- ExploitThird Party Advisory
- Vendor Advisory
- Vendor Advisory
- ExploitThird Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 5.0.2.7 (исключая)
Одновременно
cpe:2.3:a:barracuda:vpn_client:*:*:*:*:*:*:*:*
Одно из
cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:openbsd:openbsd:-:*:*:*:*:*:*:*
EPSS
Процентиль: 25%
0.00086
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-426
Связанные уязвимости
CVSS3: 7.8
github
больше 3 лет назад
The barracudavpn component of the Barracuda VPN Client prior to version 5.0.2.7 for Linux, macOS, and OpenBSD runs as a privileged process and can allow an unprivileged local attacker to load a malicious library, resulting in arbitrary code executing as root.
EPSS
Процентиль: 25%
0.00086
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-426