Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2024-4911

Опубликовано: 28 сент. 2024
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2024-4911: freeradius security update (IMPORTANT)

[3.0.13-15.0.1]

  • Fixes CVE-2024-3596 security issue [Orabug: 36904288]

Обновленные пакеты

Oracle Linux 7

Oracle Linux aarch64

freeradius-devel

3.0.13-15.0.1.el7

freeradius-doc

3.0.13-15.0.1.el7

freeradius-krb5

3.0.13-15.0.1.el7

freeradius-ldap

3.0.13-15.0.1.el7

freeradius-mysql

3.0.13-15.0.1.el7

freeradius-perl

3.0.13-15.0.1.el7

freeradius-postgresql

3.0.13-15.0.1.el7

freeradius-python

3.0.13-15.0.1.el7

freeradius-sqlite

3.0.13-15.0.1.el7

freeradius-unixODBC

3.0.13-15.0.1.el7

freeradius-utils

3.0.13-15.0.1.el7

freeradius

3.0.13-15.0.1.el7

Oracle Linux x86_64

freeradius-devel

3.0.13-15.0.1.el7

freeradius-doc

3.0.13-15.0.1.el7

freeradius-krb5

3.0.13-15.0.1.el7

freeradius-ldap

3.0.13-15.0.1.el7

freeradius-mysql

3.0.13-15.0.1.el7

freeradius-perl

3.0.13-15.0.1.el7

freeradius-postgresql

3.0.13-15.0.1.el7

freeradius-python

3.0.13-15.0.1.el7

freeradius-sqlite

3.0.13-15.0.1.el7

freeradius-unixODBC

3.0.13-15.0.1.el7

freeradius-utils

3.0.13-15.0.1.el7

freeradius

3.0.13-15.0.1.el7

Связанные CVE

Связанные уязвимости

CVSS3: 9
ubuntu
около 1 года назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS3: 9
redhat
около 1 года назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS3: 9
nvd
около 1 года назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS3: 7.5
msrc
около 1 года назад

CERT/CC: CVE-2024-3596 RADIUS Protocol Spoofing Vulnerability

CVSS3: 9
debian
около 1 года назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a ...