Description
It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated "there is simply no way for anyone to gain privileges through this alleged issue."
References (8)
Scores
CVSS v3
7.0
EPSS
0.0007
EPSS Percentile
21.8%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-266
CWE-362
CWE-250
Status
published
Products (4)
fedoraproject/fedora
29
fedoraproject/fedora
30
freeradius/freeradius
< 3.0.19
redhat/enterprise_linux
8.0
Published
May 24, 2019
Tracked Since
Feb 18, 2026