vulnerability

Red Hat: CVE-2019-10143: CVE-2019-10143 freeradius: privilege escalation due to insecure logrotate configuration (Multiple Advisories)

Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
2019-05-24
Added
2019-11-06
Modified
2023-12-15

Description

It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated "there is simply no way for anyone to gain privileges through this alleged issue."

Solution(s)

redhat-upgrade-freeradiusredhat-upgrade-freeradius-debuginforedhat-upgrade-freeradius-debugsourceredhat-upgrade-freeradius-develredhat-upgrade-freeradius-docredhat-upgrade-freeradius-krb5redhat-upgrade-freeradius-krb5-debuginforedhat-upgrade-freeradius-ldapredhat-upgrade-freeradius-ldap-debuginforedhat-upgrade-freeradius-mysqlredhat-upgrade-freeradius-mysql-debuginforedhat-upgrade-freeradius-perlredhat-upgrade-freeradius-perl-debuginforedhat-upgrade-freeradius-postgresqlredhat-upgrade-freeradius-postgresql-debuginforedhat-upgrade-freeradius-pythonredhat-upgrade-freeradius-restredhat-upgrade-freeradius-rest-debuginforedhat-upgrade-freeradius-sqliteredhat-upgrade-freeradius-sqlite-debuginforedhat-upgrade-freeradius-unixodbcredhat-upgrade-freeradius-unixodbc-debuginforedhat-upgrade-freeradius-utilsredhat-upgrade-freeradius-utils-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.