vulnerability

Amazon Linux AMI 2: CVE-2024-3596: Security patch for freeradius (ALAS-2024-2611)

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
07/09/2024
Added
08/14/2024
Modified
01/28/2025

Description

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

Solution(s)

amazon-linux-ami-2-upgrade-freeradiusamazon-linux-ami-2-upgrade-freeradius-debuginfoamazon-linux-ami-2-upgrade-freeradius-develamazon-linux-ami-2-upgrade-freeradius-docamazon-linux-ami-2-upgrade-freeradius-krb5amazon-linux-ami-2-upgrade-freeradius-ldapamazon-linux-ami-2-upgrade-freeradius-mysqlamazon-linux-ami-2-upgrade-freeradius-perlamazon-linux-ami-2-upgrade-freeradius-postgresqlamazon-linux-ami-2-upgrade-freeradius-pythonamazon-linux-ami-2-upgrade-freeradius-sqliteamazon-linux-ami-2-upgrade-freeradius-unixodbcamazon-linux-ami-2-upgrade-freeradius-utils
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.