Vulnerability Details CVE-2019-10143
It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated "there is simply no way for anyone to gain privileges through this alleged issue."
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 22.0%
CVSS Severity
CVSS v3 Score 6.4
CVSS v2 Score 6.9
Products affected by CVE-2019-10143
-
cpe:2.3:a:freeradius:freeradius:-
-
cpe:2.3:a:freeradius:freeradius:0.1
-
cpe:2.3:a:freeradius:freeradius:0.2
-
cpe:2.3:a:freeradius:freeradius:0.3
-
cpe:2.3:a:freeradius:freeradius:0.4
-
cpe:2.3:a:freeradius:freeradius:0.5
-
cpe:2.3:a:freeradius:freeradius:0.6
-
cpe:2.3:a:freeradius:freeradius:0.7
-
cpe:2.3:a:freeradius:freeradius:0.7.1
-
cpe:2.3:a:freeradius:freeradius:0.8
-
cpe:2.3:a:freeradius:freeradius:0.8.1
-
cpe:2.3:a:freeradius:freeradius:0.9.0
-
cpe:2.3:a:freeradius:freeradius:0.9.1
-
cpe:2.3:a:freeradius:freeradius:0.9.2
-
cpe:2.3:a:freeradius:freeradius:0.9.3
-
cpe:2.3:a:freeradius:freeradius:1.0.0
-
cpe:2.3:a:freeradius:freeradius:1.0.1
-
cpe:2.3:a:freeradius:freeradius:1.0.2
-
cpe:2.3:a:freeradius:freeradius:1.0.3
-
cpe:2.3:a:freeradius:freeradius:1.0.4
-
cpe:2.3:a:freeradius:freeradius:1.0.5
-
cpe:2.3:a:freeradius:freeradius:1.1.0
-
cpe:2.3:a:freeradius:freeradius:1.1.1
-
cpe:2.3:a:freeradius:freeradius:1.1.2
-
cpe:2.3:a:freeradius:freeradius:1.1.3
-
cpe:2.3:a:freeradius:freeradius:1.1.4
-
cpe:2.3:a:freeradius:freeradius:1.1.5
-
cpe:2.3:a:freeradius:freeradius:1.1.6
-
cpe:2.3:a:freeradius:freeradius:1.1.7
-
cpe:2.3:a:freeradius:freeradius:1.1.8
-
cpe:2.3:a:freeradius:freeradius:2.0
-
cpe:2.3:a:freeradius:freeradius:2.0.0
-
cpe:2.3:a:freeradius:freeradius:2.0.1
-
cpe:2.3:a:freeradius:freeradius:2.0.2
-
cpe:2.3:a:freeradius:freeradius:2.0.3
-
cpe:2.3:a:freeradius:freeradius:2.0.4
-
cpe:2.3:a:freeradius:freeradius:2.0.5
-
cpe:2.3:a:freeradius:freeradius:2.1.0
-
cpe:2.3:a:freeradius:freeradius:2.1.1
-
cpe:2.3:a:freeradius:freeradius:2.1.10
-
cpe:2.3:a:freeradius:freeradius:2.1.11
-
cpe:2.3:a:freeradius:freeradius:2.1.12
-
cpe:2.3:a:freeradius:freeradius:2.1.2
-
cpe:2.3:a:freeradius:freeradius:2.1.3
-
cpe:2.3:a:freeradius:freeradius:2.1.4
-
cpe:2.3:a:freeradius:freeradius:2.1.6
-
cpe:2.3:a:freeradius:freeradius:2.1.7
-
cpe:2.3:a:freeradius:freeradius:2.1.8
-
cpe:2.3:a:freeradius:freeradius:2.1.9
-
cpe:2.3:a:freeradius:freeradius:2.2.0
-
cpe:2.3:a:freeradius:freeradius:2.2.1
-
cpe:2.3:a:freeradius:freeradius:2.2.10
-
cpe:2.3:a:freeradius:freeradius:2.2.2
-
cpe:2.3:a:freeradius:freeradius:2.2.3
-
cpe:2.3:a:freeradius:freeradius:2.2.4
-
cpe:2.3:a:freeradius:freeradius:2.2.5
-
cpe:2.3:a:freeradius:freeradius:2.2.6
-
cpe:2.3:a:freeradius:freeradius:2.2.7
-
cpe:2.3:a:freeradius:freeradius:2.2.8
-
cpe:2.3:a:freeradius:freeradius:2.2.9
-
cpe:2.3:a:freeradius:freeradius:3.0.0
-
cpe:2.3:a:freeradius:freeradius:3.0.1
-
cpe:2.3:a:freeradius:freeradius:3.0.10
-
cpe:2.3:a:freeradius:freeradius:3.0.11
-
cpe:2.3:a:freeradius:freeradius:3.0.12
-
cpe:2.3:a:freeradius:freeradius:3.0.13
-
cpe:2.3:a:freeradius:freeradius:3.0.14
-
cpe:2.3:a:freeradius:freeradius:3.0.15
-
cpe:2.3:a:freeradius:freeradius:3.0.16
-
cpe:2.3:a:freeradius:freeradius:3.0.17
-
cpe:2.3:a:freeradius:freeradius:3.0.18
-
cpe:2.3:a:freeradius:freeradius:3.0.19
-
cpe:2.3:a:freeradius:freeradius:3.0.2
-
cpe:2.3:a:freeradius:freeradius:3.0.3
-
cpe:2.3:a:freeradius:freeradius:3.0.4
-
cpe:2.3:a:freeradius:freeradius:3.0.5
-
cpe:2.3:a:freeradius:freeradius:3.0.6
-
cpe:2.3:a:freeradius:freeradius:3.0.7
-
cpe:2.3:a:freeradius:freeradius:3.0.8
-
cpe:2.3:a:freeradius:freeradius:3.0.9
-
cpe:2.3:o:fedoraproject:fedora:29
-
cpe:2.3:o:fedoraproject:fedora:30
-
cpe:2.3:o:redhat:enterprise_linux:8.0