Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2024:4935

Опубликовано: 01 авг. 2024
Источник: rocky
Оценка: Important

Описание

Important: freeradius security update

FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.

Security Fix(es):

  • freeradius: forgery attack (CVE-2024-3596)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
freeradiusx86_6440.el9_4freeradius-3.0.21-40.el9_4.x86_64.rpm
freeradius-develx86_6440.el9_4freeradius-devel-3.0.21-40.el9_4.x86_64.rpm
freeradius-docx86_6440.el9_4freeradius-doc-3.0.21-40.el9_4.x86_64.rpm
freeradius-krb5x86_6440.el9_4freeradius-krb5-3.0.21-40.el9_4.x86_64.rpm
freeradius-ldapx86_6440.el9_4freeradius-ldap-3.0.21-40.el9_4.x86_64.rpm
freeradius-utilsx86_6440.el9_4freeradius-utils-3.0.21-40.el9_4.x86_64.rpm
python3-freeradiusx86_6440.el9_4python3-freeradius-3.0.21-40.el9_4.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 9
ubuntu
11 месяцев назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS3: 9
redhat
12 месяцев назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS3: 9
nvd
11 месяцев назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS3: 7.5
msrc
12 месяцев назад

CERT/CC: CVE-2024-3596 RADIUS Protocol Spoofing Vulnerability

CVSS3: 9
debian
11 месяцев назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a ...