vulnerability
Alma Linux: CVE-2024-3596: Important: krb5 security update (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
9 | (AV:N/AC:M/Au:N/C:C/I:C/A:C) | 07/09/2024 | 08/08/2024 | 04/15/2025 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
07/09/2024
Added
08/08/2024
Modified
04/15/2025
Description
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
Solution(s)
alma-upgrade-freeradiusalma-upgrade-freeradius-develalma-upgrade-freeradius-docalma-upgrade-freeradius-krb5alma-upgrade-freeradius-ldapalma-upgrade-freeradius-mysqlalma-upgrade-freeradius-perlalma-upgrade-freeradius-postgresqlalma-upgrade-freeradius-restalma-upgrade-freeradius-sqlitealma-upgrade-freeradius-unixodbcalma-upgrade-freeradius-utilsalma-upgrade-krb5-develalma-upgrade-krb5-libsalma-upgrade-krb5-pkinitalma-upgrade-krb5-serveralma-upgrade-krb5-server-ldapalma-upgrade-krb5-workstationalma-upgrade-libkadm5alma-upgrade-python3-freeradius

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.