First published: Tue Jul 18 2017(Updated: )
A remote command injection vulnerability exists in the Barracuda Load Balancer product line (confirmed on v5.4.0.004 (2015-11-26) and v6.0.1.006 (2016-08-19); fixed in 6.1.0.003 (2017-01-17)) in which an authenticated user can execute arbitrary shell commands and gain root privileges. The vulnerability stems from unsanitized data being processed in a system call when the delete_assessment command is issued.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Barracuda Load Balancer | <=6.0.1.006 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6320 has a high severity rating due to its potential for remote command injection and privilege escalation.
To fix CVE-2017-6320, upgrade to Barracuda Load Balancer version 6.1.0.003 or later.
CVE-2017-6320 affects Barracuda Load Balancer versions up to and including 6.0.1.006.
CVE-2017-6320 is classified as a remote command injection vulnerability.
Authenticated users can exploit CVE-2017-6320 to execute arbitrary shell commands.