vulnerability
Amazon Linux AMI 2: CVE-2024-3596: Security patch for freeradius (ALAS-2024-2611)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
9 | (AV:N/AC:M/Au:N/C:C/I:C/A:C) | 07/09/2024 | 08/14/2024 | 01/28/2025 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
07/09/2024
Added
08/14/2024
Modified
01/28/2025
Description
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
Solution(s)
amazon-linux-ami-2-upgrade-freeradiusamazon-linux-ami-2-upgrade-freeradius-debuginfoamazon-linux-ami-2-upgrade-freeradius-develamazon-linux-ami-2-upgrade-freeradius-docamazon-linux-ami-2-upgrade-freeradius-krb5amazon-linux-ami-2-upgrade-freeradius-ldapamazon-linux-ami-2-upgrade-freeradius-mysqlamazon-linux-ami-2-upgrade-freeradius-perlamazon-linux-ami-2-upgrade-freeradius-postgresqlamazon-linux-ami-2-upgrade-freeradius-pythonamazon-linux-ami-2-upgrade-freeradius-sqliteamazon-linux-ami-2-upgrade-freeradius-unixodbcamazon-linux-ami-2-upgrade-freeradius-utils

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.