GNS3 ubridge through 0.9.18 on macOS, as used in GNS3 server before 2.1.17, allows a local attacker to read arbitrary files because it handles configuration-file errors by printing the configuration file while executing in a setuid root context.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T13:00:52.075Z
Reserved: 2020-06-22T00:00:00
Link: CVE-2020-14976

No data.

Status : Modified
Published: 2020-06-23T20:15:12.927
Modified: 2024-11-21T05:04:33.520
Link: CVE-2020-14976

No data.