Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2019-10143 : Security Advisory and Response

Learn about CVE-2019-10143, a vulnerability in freeradius up to version 3.0.19 allowing local attackers to escalate privileges. Find mitigation steps and affected systems here.

CVE-2019-10143 is a vulnerability found in freeradius up to version 3.0.19, where the logrotate configuration is not set correctly, allowing a local attacker to elevate their privileges to root. This CVE was published on May 24, 2019, by Red Hat.

Understanding CVE-2019-10143

This section provides insights into the nature and impact of the CVE-2019-10143 vulnerability.

What is CVE-2019-10143?

The vulnerability in freeradius up to version 3.0.19 allows a local attacker with control of the radiusd user to escalate their privileges to root by manipulating logrotate to write a file that is writable by the radiusd user to an inaccessible directory.

The Impact of CVE-2019-10143

The exploitation of this vulnerability could lead to a local attacker gaining root privileges on the affected system, potentially compromising its security and integrity.

Technical Details of CVE-2019-10143

This section delves into the technical aspects of CVE-2019-10143.

Vulnerability Description

The flaw in freeradius up to version 3.0.19 allows a local attacker to deceive logrotate into writing a file that grants root privileges, exploiting the incorrect logrotate configuration.

Affected Systems and Versions

        Vendor: freeradius
        Product: freeradius
        Affected Version: <= 3.0.19

Exploitation Mechanism

The attacker, with control of the radiusd user, manipulates logrotate to write a file writable by radiusd to an inaccessible directory, thereby gaining root privileges.

Mitigation and Prevention

This section outlines steps to mitigate and prevent exploitation of CVE-2019-10143.

Immediate Steps to Take

        Update freeradius to a version beyond 3.0.19 to mitigate the vulnerability.
        Monitor system logs for any suspicious activities related to logrotate.

Long-Term Security Practices

        Implement the principle of least privilege to restrict user capabilities.
        Regularly review and update logrotate configurations to prevent similar privilege escalation vulnerabilities.

Patching and Updates

        Apply patches provided by the vendor to address the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now