CVE-2019-10143
HIGHFreeradius <3.0.19 - Privilege Escalation
Title source: llmDescription
It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated "there is simply no way for anyone to gain privileges through this alleged issue."
References (8)
Scores
CVSS v3
7.0
EPSS
0.0008
EPSS Percentile
22.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-266
CWE-362
CWE-250
Status
published
Affected Products (4)
freeradius/freeradius
< 3.0.19
fedoraproject/fedora
fedoraproject/fedora
redhat/enterprise_linux
Timeline
Published
May 24, 2019
Tracked Since
Feb 18, 2026