vulnerability
Red Hat: CVE-2019-10143: CVE-2019-10143 freeradius: privilege escalation due to insecure logrotate configuration (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:M/Au:N/C:C/I:C/A:C) | 2019-05-24 | 2019-11-06 | 2023-12-15 |
Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
2019-05-24
Added
2019-11-06
Modified
2023-12-15
Description
It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated "there is simply no way for anyone to gain privileges through this alleged issue."
Solution(s)
redhat-upgrade-freeradiusredhat-upgrade-freeradius-debuginforedhat-upgrade-freeradius-debugsourceredhat-upgrade-freeradius-develredhat-upgrade-freeradius-docredhat-upgrade-freeradius-krb5redhat-upgrade-freeradius-krb5-debuginforedhat-upgrade-freeradius-ldapredhat-upgrade-freeradius-ldap-debuginforedhat-upgrade-freeradius-mysqlredhat-upgrade-freeradius-mysql-debuginforedhat-upgrade-freeradius-perlredhat-upgrade-freeradius-perl-debuginforedhat-upgrade-freeradius-postgresqlredhat-upgrade-freeradius-postgresql-debuginforedhat-upgrade-freeradius-pythonredhat-upgrade-freeradius-restredhat-upgrade-freeradius-rest-debuginforedhat-upgrade-freeradius-sqliteredhat-upgrade-freeradius-sqlite-debuginforedhat-upgrade-freeradius-unixodbcredhat-upgrade-freeradius-unixodbc-debuginforedhat-upgrade-freeradius-utilsredhat-upgrade-freeradius-utils-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.