Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-10143

Опубликовано: 01 мая 2019
Источник: redhat
CVSS3: 6.4
EPSS Низкий

Описание

It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated "there is simply no way for anyone to gain privileges through this alleged issue."

It was discovered freeradius does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user.

Меры по смягчению последствий

Add su radiusd:radiusd to all log sections in /etc/logrotate.d/radiusd. By keeping SELinux in "Enforcing" mode, radiusd user will be limited in the directories he can write to.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5freeradiusOut of support scope
Red Hat Enterprise Linux 5freeradius2Out of support scope
Red Hat Enterprise Linux 6freeradiusOut of support scope
Red Hat Enterprise Linux 7freeradiusFixedRHSA-2020:398429.09.2020
Red Hat Enterprise Linux 8freeradiusFixedRHSA-2019:335305.11.2019

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-266
Дефект:
CWE-250
https://bugzilla.redhat.com/show_bug.cgi?id=1705340freeradius: privilege escalation due to insecure logrotate configuration

EPSS

Процентиль: 23%
0.00077
Низкий

6.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 7
ubuntu
больше 6 лет назад

It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated "there is simply no way for anyone to gain privileges through this alleged issue."

CVSS3: 7
nvd
больше 6 лет назад

It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated "there is simply no way for anyone to gain privileges through this alleged issue."

CVSS3: 7
debian
больше 6 лет назад

It was discovered freeradius up to and including version 3.0.19 does n ...

CVSS3: 7
github
больше 3 лет назад

It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user.

oracle-oval
около 6 лет назад

ELSA-2019-3353: freeradius:3.0 security and bug fix update (MODERATE)

EPSS

Процентиль: 23%
0.00077
Низкий

6.4 Medium

CVSS3