Vulnerability Description
It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated "there is simply no way for anyone to gain privileges through this alleged issue."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freeradius | Freeradius | <= 3.0.19 |
| Fedoraproject | Fedora | 29 |
| Redhat | Enterprise Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/155361/FreeRadius-3.0.19-Logrotate-PrivilegExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2019/Nov/14ExploitMailing ListThird Party Advisory
- https://access.redhat.com/errata/RHSA-2019:3353Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10143Issue TrackingThird Party Advisory
- https://freeradius.org/security/Third Party Advisory
- https://github.com/FreeRADIUS/freeradius-server/pull/2666Third Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- http://packetstormsecurity.com/files/155361/FreeRadius-3.0.19-Logrotate-PrivilegExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2019/Nov/14ExploitMailing ListThird Party Advisory
- https://access.redhat.com/errata/RHSA-2019:3353Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10143Issue TrackingThird Party Advisory
- https://freeradius.org/security/Third Party Advisory
- https://github.com/FreeRADIUS/freeradius-server/pull/2666Third Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
FAQ
What is CVE-2019-10143?
CVE-2019-10143 is a vulnerability with a CVSS score of 7.0 (HIGH). It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges...
How severe is CVE-2019-10143?
CVE-2019-10143 has been rated HIGH with a CVSS base score of 7.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-10143?
Check the references section above for vendor advisories and patch information. Affected products include: Freeradius Freeradius, Fedoraproject Fedora, Redhat Enterprise Linux.