CVE-2019-10143

It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated "there is simply no way for anyone to gain privileges through this alleged issue."
References
Link Resource
http://packetstormsecurity.com/files/155361/FreeRadius-3.0.19-Logrotate-Privilege-Escalation.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2019/Nov/14 Exploit Mailing List Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3353 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10143 Issue Tracking Third Party Advisory
https://freeradius.org/security/ Third Party Advisory
https://github.com/FreeRADIUS/freeradius-server/pull/2666 Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A6VKBZAZKJP5QKXDXRKCM2ZPZND3TFAX/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TKODLHHUOVAYENTBP4D3N25ST3Q6LJBP/
http://packetstormsecurity.com/files/155361/FreeRadius-3.0.19-Logrotate-Privilege-Escalation.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2019/Nov/14 Exploit Mailing List Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3353 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10143 Issue Tracking Third Party Advisory
https://freeradius.org/security/ Third Party Advisory
https://github.com/FreeRADIUS/freeradius-server/pull/2666 Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A6VKBZAZKJP5QKXDXRKCM2ZPZND3TFAX/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TKODLHHUOVAYENTBP4D3N25ST3Q6LJBP/
Configurations

Configuration 1 (hide)

cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:18

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/155361/FreeRadius-3.0.19-Logrotate-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/155361/FreeRadius-3.0.19-Logrotate-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2019/Nov/14 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2019/Nov/14 - Exploit, Mailing List, Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:3353 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:3353 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10143 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10143 - Issue Tracking, Third Party Advisory
References () https://freeradius.org/security/ - Third Party Advisory () https://freeradius.org/security/ - Third Party Advisory
References () https://github.com/FreeRADIUS/freeradius-server/pull/2666 - Third Party Advisory () https://github.com/FreeRADIUS/freeradius-server/pull/2666 - Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A6VKBZAZKJP5QKXDXRKCM2ZPZND3TFAX/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A6VKBZAZKJP5QKXDXRKCM2ZPZND3TFAX/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TKODLHHUOVAYENTBP4D3N25ST3Q6LJBP/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TKODLHHUOVAYENTBP4D3N25ST3Q6LJBP/ -

07 Nov 2023, 03:02

Type Values Removed Values Added
Summary ** DISPUTED ** It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated "there is simply no way for anyone to gain privileges through this alleged issue." It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated "there is simply no way for anyone to gain privileges through this alleged issue."
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6VKBZAZKJP5QKXDXRKCM2ZPZND3TFAX/', 'name': 'FEDORA-2019-9454ce61b2', 'tags': [], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TKODLHHUOVAYENTBP4D3N25ST3Q6LJBP/', 'name': 'FEDORA-2019-4a8eeaf80e', 'tags': [], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A6VKBZAZKJP5QKXDXRKCM2ZPZND3TFAX/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TKODLHHUOVAYENTBP4D3N25ST3Q6LJBP/ -

Information

Published : 2019-05-24 17:29

Updated : 2024-11-21 04:18


NVD link : CVE-2019-10143

Mitre link : CVE-2019-10143

CVE.ORG link : CVE-2019-10143


JSON object : View

Products Affected

redhat

  • enterprise_linux

fedoraproject

  • fedora

freeradius

  • freeradius
CWE
CWE-250

Execution with Unnecessary Privileges

CWE-266

Incorrect Privilege Assignment

CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')