It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated "there is simply no way for anyone to gain privileges through this alleged issue."
Advisories
Source ID Title
EUVD EUVD EUVD-2019-2181 It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated "there is simply no way for anyone to gain privileges through this alleged issue."
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-04T22:10:10.031Z

Reserved: 2019-03-27T00:00:00

Link: CVE-2019-10143

cve-icon Vulnrichment

Updated: 2024-08-04T22:10:10.031Z

cve-icon NVD

Status : Modified

Published: 2019-05-24T17:29:02.490

Modified: 2024-11-21T04:18:30.510

Link: CVE-2019-10143

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-05-01T00:00:00Z

Links: CVE-2019-10143 - Bugzilla

cve-icon OpenCVE Enrichment

No data.