Количество 22
Количество 22
CVE-2024-3596
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
CVE-2024-3596
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
CVE-2024-3596
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
CVE-2024-3596
CERT/CC: CVE-2024-3596 RADIUS Protocol Spoofing Vulnerability
CVE-2024-3596
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a ...
SUSE-SU-2024:2367-1
Security update for freeradius-server
SUSE-SU-2024:2366-1
Security update for freeradius-server
SUSE-SU-2024:2361-1
Security update for freeradius-server
SUSE-SU-2024:2359-1
Security update for freeradius-server
RLSA-2024:9474
Important: krb5 security update
RLSA-2024:8860
Important: krb5 security update
RLSA-2024:4936
Important: freeradius:3.0 security update
RLSA-2024:4935
Important: freeradius security update
GHSA-3g8x-wqfp-q876
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
ELSA-2024-9474
ELSA-2024-9474: krb5 security update (IMPORTANT)
ELSA-2024-8860
ELSA-2024-8860: krb5 security update (IMPORTANT)
ELSA-2024-8788
ELSA-2024-8788: krb5 security update (IMPORTANT)
ELSA-2024-4936
ELSA-2024-4936: freeradius:3.0 security update (IMPORTANT)
ELSA-2024-4935
ELSA-2024-4935: freeradius security update (IMPORTANT)
ELSA-2024-4911
ELSA-2024-4911: freeradius security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature. | CVSS3: 9 | 19% Средний | больше 1 года назад | |
CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature. | CVSS3: 9 | 19% Средний | больше 1 года назад | |
CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature. | CVSS3: 9 | 19% Средний | больше 1 года назад | |
CVE-2024-3596 CERT/CC: CVE-2024-3596 RADIUS Protocol Spoofing Vulnerability | CVSS3: 7.5 | 19% Средний | больше 1 года назад | |
CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a ... | CVSS3: 9 | 19% Средний | больше 1 года назад | |
SUSE-SU-2024:2367-1 Security update for freeradius-server | 19% Средний | больше 1 года назад | ||
SUSE-SU-2024:2366-1 Security update for freeradius-server | 19% Средний | больше 1 года назад | ||
SUSE-SU-2024:2361-1 Security update for freeradius-server | 19% Средний | больше 1 года назад | ||
SUSE-SU-2024:2359-1 Security update for freeradius-server | 19% Средний | больше 1 года назад | ||
RLSA-2024:9474 Important: krb5 security update | 19% Средний | 9 месяцев назад | ||
RLSA-2024:8860 Important: krb5 security update | 19% Средний | около 1 года назад | ||
RLSA-2024:4936 Important: freeradius:3.0 security update | 19% Средний | больше 1 года назад | ||
RLSA-2024:4935 Important: freeradius security update | 19% Средний | больше 1 года назад | ||
GHSA-3g8x-wqfp-q876 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature. | CVSS3: 9 | 19% Средний | больше 1 года назад | |
ELSA-2024-9474 ELSA-2024-9474: krb5 security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-8860 ELSA-2024-8860: krb5 security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-8788 ELSA-2024-8788: krb5 security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-4936 ELSA-2024-4936: freeradius:3.0 security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2024-4935 ELSA-2024-4935: freeradius security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2024-4911 ELSA-2024-4911: freeradius security update (IMPORTANT) | около 1 года назад |
Уязвимостей на страницу