Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2024:9474

Опубликовано: 17 мар. 2025
Источник: rocky
Оценка: Important

Описание

Important: krb5 security update

Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).

Security Fix(es):

  • freeradius: forgery attack (CVE-2024-3596)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
krb5-libsi6864.el9_5krb5-libs-1.21.1-4.el9_5.i686.rpm
krb5-libsx86_644.el9_5krb5-libs-1.21.1-4.el9_5.x86_64.rpm
krb5-pkiniti6864.el9_5krb5-pkinit-1.21.1-4.el9_5.i686.rpm
krb5-pkinitx86_644.el9_5krb5-pkinit-1.21.1-4.el9_5.x86_64.rpm
krb5-serveri6864.el9_5krb5-server-1.21.1-4.el9_5.i686.rpm
krb5-serverx86_644.el9_5krb5-server-1.21.1-4.el9_5.x86_64.rpm
krb5-server-ldapi6864.el9_5krb5-server-ldap-1.21.1-4.el9_5.i686.rpm
krb5-server-ldapx86_644.el9_5krb5-server-ldap-1.21.1-4.el9_5.x86_64.rpm
krb5-workstationx86_644.el9_5krb5-workstation-1.21.1-4.el9_5.x86_64.rpm
libkadm5i6864.el9_5libkadm5-1.21.1-4.el9_5.i686.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 9
ubuntu
больше 1 года назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS3: 9
redhat
больше 1 года назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS3: 9
nvd
больше 1 года назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS3: 7.5
msrc
больше 1 года назад

CERT/CC: CVE-2024-3596 RADIUS Protocol Spoofing Vulnerability

CVSS3: 9
debian
больше 1 года назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a ...