vulnerability
Rocky Linux: CVE-2024-3596: krb5 (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
9 | (AV:N/AC:M/Au:N/C:C/I:C/A:C) | 07/09/2024 | 08/01/2024 | 03/18/2025 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
07/09/2024
Added
08/01/2024
Modified
03/18/2025
Description
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
Solution(s)
rocky-upgrade-freeradiusrocky-upgrade-freeradius-debuginforocky-upgrade-freeradius-debugsourcerocky-upgrade-freeradius-develrocky-upgrade-freeradius-docrocky-upgrade-freeradius-krb5rocky-upgrade-freeradius-krb5-debuginforocky-upgrade-freeradius-ldaprocky-upgrade-freeradius-ldap-debuginforocky-upgrade-freeradius-mysqlrocky-upgrade-freeradius-mysql-debuginforocky-upgrade-freeradius-perlrocky-upgrade-freeradius-perl-debuginforocky-upgrade-freeradius-postgresqlrocky-upgrade-freeradius-postgresql-debuginforocky-upgrade-freeradius-restrocky-upgrade-freeradius-rest-debuginforocky-upgrade-freeradius-sqliterocky-upgrade-freeradius-sqlite-debuginforocky-upgrade-freeradius-unixodbcrocky-upgrade-freeradius-unixodbc-debuginforocky-upgrade-freeradius-utilsrocky-upgrade-freeradius-utils-debuginforocky-upgrade-krb5-debuginforocky-upgrade-krb5-debugsourcerocky-upgrade-krb5-develrocky-upgrade-krb5-devel-debuginforocky-upgrade-krb5-libsrocky-upgrade-krb5-libs-debuginforocky-upgrade-krb5-pkinitrocky-upgrade-krb5-pkinit-debuginforocky-upgrade-krb5-serverrocky-upgrade-krb5-server-debuginforocky-upgrade-krb5-server-ldaprocky-upgrade-krb5-server-ldap-debuginforocky-upgrade-krb5-workstationrocky-upgrade-krb5-workstation-debuginforocky-upgrade-libkadm5rocky-upgrade-libkadm5-debuginforocky-upgrade-python3-freeradiusrocky-upgrade-python3-freeradius-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.