Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-10143
HistoryMay 24, 2019 - 12:00 a.m.

CVE-2019-10143

2019-05-2400:00:00
ubuntu.com
ubuntu.com
8

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

23.5%

DISPUTED It was discovered freeradius up to and including version
3.0.19 does not correctly configure logrotate, allowing a local attacker
who already has control of the radiusd user to escalate his privileges to
root, by tricking logrotate into writing a radiusd-writable file to a
directory normally inaccessible by the radiusd user. NOTE: the upstream
software maintainer has stated “there is simply no way for anyone to gain
privileges through this alleged issue.”

Bugs

Notes

Author Note
leosilva following the discussion from upstream…this issue doesn’t seems to be a security one. For now moving it to low priority.

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

23.5%