GNS3 ubridge through 0.9.18 on macOS, as used in GNS3 server before 2.1.17, allows a local attacker to read arbitrary files because it handles configuration-file errors by printing the configuration file while executing in a setuid root context.
[
{
"id": "CVE-2020-14976-3b67f32d",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "src/iniparser/iniparser.c"
},
"digest": {
"line_hashes": [
"265850367731470298941602382151312060980",
"289674360931346378101879824949876529007",
"106477639094438218222040658658249172996",
"172699477009183577936036454660150799316",
"281372692244940741176643152889247552765",
"91616182508746529756050155610897265965",
"309148639836150701363525286184763198188",
"148347349425304758232367714523919767514",
"134224082854366621195085853342399150645",
"171720720016666648477290419182473583382",
"160509415694025110407423957687781611724"
],
"threshold": 0.9
},
"source": "https://github.com/gns3/ubridge/commit/2eb0d1dab6a6de76cf3556130a2d52af101077db"
},
{
"id": "CVE-2020-14976-75dca24f",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "src/parse.c"
},
"digest": {
"line_hashes": [
"64865900387092539737807046522785556551",
"140524880231888173587844582122141946266",
"249917321025574017722877724538433949832",
"88045354632534678241792192394035187424"
],
"threshold": 0.9
},
"source": "https://github.com/gns3/ubridge/commit/2eb0d1dab6a6de76cf3556130a2d52af101077db"
},
{
"id": "CVE-2020-14976-99d677ec",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "src/iniparser/iniparser.h"
},
"digest": {
"line_hashes": [
"307679288734870480734655321220263235758",
"173124878271179979875813809784544906513",
"285052786989348092953683193161552711385",
"164630037979637347732873737821428320892",
"51297103856361491509793688593429624879",
"7339475708965471308788513831960141370",
"259197655807510667277793536591231692273"
],
"threshold": 0.9
},
"source": "https://github.com/gns3/ubridge/commit/2eb0d1dab6a6de76cf3556130a2d52af101077db"
},
{
"id": "CVE-2020-14976-ae02b975",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Function",
"target": {
"file": "src/parse.c",
"function": "parse_config"
},
"digest": {
"function_hash": "158274898388520807559066150982828201302",
"length": 2056.0
},
"source": "https://github.com/gns3/ubridge/commit/2eb0d1dab6a6de76cf3556130a2d52af101077db"
},
{
"id": "CVE-2020-14976-d99ab4df",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Function",
"target": {
"file": "src/iniparser/iniparser.c",
"function": "iniparser_load"
},
"digest": {
"function_hash": "138374734529294390996538475399857771297",
"length": 1870.0
},
"source": "https://github.com/gns3/ubridge/commit/2eb0d1dab6a6de76cf3556130a2d52af101077db"
}
]