Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-10143
HistoryMay 24, 2019 - 12:00 a.m.

CVE-2019-10143

2019-05-2400:00:00
ubuntu.com
ubuntu.com
6

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

22.3%

DISPUTED It was discovered freeradius up to and including version
3.0.19 does not correctly configure logrotate, allowing a local attacker
who already has control of the radiusd user to escalate his privileges to
root, by tricking logrotate into writing a radiusd-writable file to a
directory normally inaccessible by the radiusd user. NOTE: the upstream
software maintainer has stated “there is simply no way for anyone to gain
privileges through this alleged issue.”

Bugs

Notes

Author Note
leosilva following the discussion from upstream…this issue doesn’t seems to be a security one. For now moving it to low priority.

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

22.3%