Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2024:8860

Опубликовано: 08 нояб. 2024
Источник: rocky
Оценка: Important

Описание

Important: krb5 security update

Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).

Security Fix(es):

  • freeradius: forgery attack (CVE-2024-3596)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
krb5-develx86_6430.el8_10krb5-devel-1.18.2-30.el8_10.x86_64.rpm
krb5-libsx86_6430.el8_10krb5-libs-1.18.2-30.el8_10.x86_64.rpm
krb5-pkinitx86_6430.el8_10krb5-pkinit-1.18.2-30.el8_10.x86_64.rpm
krb5-serverx86_6430.el8_10krb5-server-1.18.2-30.el8_10.x86_64.rpm
krb5-server-ldapx86_6430.el8_10krb5-server-ldap-1.18.2-30.el8_10.x86_64.rpm
krb5-workstationx86_6430.el8_10krb5-workstation-1.18.2-30.el8_10.x86_64.rpm
libkadm5x86_6430.el8_10libkadm5-1.18.2-30.el8_10.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 9
ubuntu
около 1 года назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS3: 9
redhat
около 1 года назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS3: 9
nvd
около 1 года назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS3: 7.5
msrc
около 1 года назад

CERT/CC: CVE-2024-3596 RADIUS Protocol Spoofing Vulnerability

CVSS3: 9
debian
около 1 года назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a ...