vulnerability
Alma Linux: CVE-2024-3596: Important: freeradius security update (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:N/C:C/I:C/A:C) | Jul 9, 2024 | Aug 8, 2024 | Mar 31, 2026 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
Jul 9, 2024
Added
Aug 8, 2024
Modified
Mar 31, 2026
Description
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
Solutions
alma-upgrade-freeradiusalma-upgrade-freeradius-develalma-upgrade-freeradius-docalma-upgrade-freeradius-krb5alma-upgrade-freeradius-ldapalma-upgrade-freeradius-mysqlalma-upgrade-freeradius-perlalma-upgrade-freeradius-postgresqlalma-upgrade-freeradius-restalma-upgrade-freeradius-sqlitealma-upgrade-freeradius-unixodbcalma-upgrade-freeradius-utilsalma-upgrade-krb5-develalma-upgrade-krb5-libsalma-upgrade-krb5-pkinitalma-upgrade-krb5-serveralma-upgrade-krb5-server-ldapalma-upgrade-krb5-workstationalma-upgrade-libkadm5alma-upgrade-python3-freeradius
References
- CVE-2024-3596
- https://attackerkb.com/topics/CVE-2024-3596
- CWE-354
- CWE-924
- EUVD-EUVD-2024-32175
- https://errata.almalinux.org/8/ALSA-2024-4936.html
- https://errata.almalinux.org/8/ALSA-2024-8860.html
- https://errata.almalinux.org/9/ALSA-2024-4935.html
- https://errata.almalinux.org/9/ALSA-2024-9474.html
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2024-32175
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.