7 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
22.3%
DISPUTED It was discovered freeradius up to and including version
3.0.19 does not correctly configure logrotate, allowing a local attacker
who already has control of the radiusd user to escalate his privileges to
root, by tricking logrotate into writing a radiusd-writable file to a
directory normally inaccessible by the radiusd user. NOTE: the upstream
software maintainer has stated “there is simply no way for anyone to gain
privileges through this alleged issue.”
Author | Note |
---|---|
leosilva | following the discussion from upstream…this issue doesn’t seems to be a security one. For now moving it to low priority. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | freeradius | < any | UNKNOWN |
ubuntu | 20.04 | noarch | freeradius | < any | UNKNOWN |
ubuntu | 22.04 | noarch | freeradius | < any | UNKNOWN |
ubuntu | 23.10 | noarch | freeradius | < any | UNKNOWN |
ubuntu | 16.04 | noarch | freeradius | < any | UNKNOWN |
7 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
22.3%