Learn about CVE-2019-10143, a vulnerability in freeradius up to version 3.0.19 allowing local attackers to escalate privileges. Find mitigation steps and affected systems here.
CVE-2019-10143 is a vulnerability found in freeradius up to version 3.0.19, where the logrotate configuration is not set correctly, allowing a local attacker to elevate their privileges to root. This CVE was published on May 24, 2019, by Red Hat.
Understanding CVE-2019-10143
This section provides insights into the nature and impact of the CVE-2019-10143 vulnerability.
What is CVE-2019-10143?
The vulnerability in freeradius up to version 3.0.19 allows a local attacker with control of the radiusd user to escalate their privileges to root by manipulating logrotate to write a file that is writable by the radiusd user to an inaccessible directory.
The Impact of CVE-2019-10143
The exploitation of this vulnerability could lead to a local attacker gaining root privileges on the affected system, potentially compromising its security and integrity.
Technical Details of CVE-2019-10143
This section delves into the technical aspects of CVE-2019-10143.
Vulnerability Description
The flaw in freeradius up to version 3.0.19 allows a local attacker to deceive logrotate into writing a file that grants root privileges, exploiting the incorrect logrotate configuration.
Affected Systems and Versions
Exploitation Mechanism
The attacker, with control of the radiusd user, manipulates logrotate to write a file writable by radiusd to an inaccessible directory, thereby gaining root privileges.
Mitigation and Prevention
This section outlines steps to mitigate and prevent exploitation of CVE-2019-10143.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates