First published: Tue Jun 23 2020(Updated: )
GNS3 ubridge through 0.9.18 on macOS, as used in GNS3 server before 2.1.17, allows a local attacker to read arbitrary files because it handles configuration-file errors by printing the configuration file while executing in a setuid root context.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gns3 Ubridge | <=0.9.18 | |
Gns3 Gns3 | <2.1.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.