Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2024:8860

Опубликовано: 08 нояб. 2024
Источник: rocky
Оценка: Important

Описание

Important: krb5 security update

Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).

Security Fix(es):

  • freeradius: forgery attack (CVE-2024-3596)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
krb5-develx86_6430.el8_10krb5-devel-1.18.2-30.el8_10.x86_64.rpm
krb5-libsx86_6430.el8_10krb5-libs-1.18.2-30.el8_10.x86_64.rpm
krb5-pkinitx86_6430.el8_10krb5-pkinit-1.18.2-30.el8_10.x86_64.rpm
krb5-serverx86_6430.el8_10krb5-server-1.18.2-30.el8_10.x86_64.rpm
krb5-server-ldapx86_6430.el8_10krb5-server-ldap-1.18.2-30.el8_10.x86_64.rpm
krb5-workstationx86_6430.el8_10krb5-workstation-1.18.2-30.el8_10.x86_64.rpm
libkadm5x86_6430.el8_10libkadm5-1.18.2-30.el8_10.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 9
ubuntu
11 месяцев назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS3: 9
redhat
12 месяцев назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS3: 9
nvd
11 месяцев назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS3: 7.5
msrc
11 месяцев назад

CERT/CC: CVE-2024-3596 RADIUS Protocol Spoofing Vulnerability

CVSS3: 9
debian
11 месяцев назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a ...