It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated there is simply no way for anyone to gain privileges through this alleged issue.
The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Freeradius | Freeradius | * | 3.0.19 (including) |
Red Hat Enterprise Linux 7 | RedHat | freeradius-0:3.0.13-15.el7 | * |
Red Hat Enterprise Linux 8 | RedHat | freeradius:3.0-8010020190614154208.16b3ab4d | * |
Freeradius | Ubuntu | bionic | * |
Freeradius | Ubuntu | cosmic | * |
Freeradius | Ubuntu | disco | * |
Freeradius | Ubuntu | eoan | * |
Freeradius | Ubuntu | focal | * |
Freeradius | Ubuntu | groovy | * |
Freeradius | Ubuntu | hirsute | * |
Freeradius | Ubuntu | impish | * |
Freeradius | Ubuntu | kinetic | * |
Freeradius | Ubuntu | lunar | * |
Freeradius | Ubuntu | mantic | * |
Freeradius | Ubuntu | oracular | * |
Freeradius | Ubuntu | trusty | * |
Freeradius | Ubuntu | xenial | * |