vulnerability

Rocky Linux: CVE-2024-3596: krb5 (Multiple Advisories)

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
07/09/2024
Added
08/01/2024
Modified
03/18/2025

Description

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

Solution(s)

rocky-upgrade-freeradiusrocky-upgrade-freeradius-debuginforocky-upgrade-freeradius-debugsourcerocky-upgrade-freeradius-develrocky-upgrade-freeradius-docrocky-upgrade-freeradius-krb5rocky-upgrade-freeradius-krb5-debuginforocky-upgrade-freeradius-ldaprocky-upgrade-freeradius-ldap-debuginforocky-upgrade-freeradius-mysqlrocky-upgrade-freeradius-mysql-debuginforocky-upgrade-freeradius-perlrocky-upgrade-freeradius-perl-debuginforocky-upgrade-freeradius-postgresqlrocky-upgrade-freeradius-postgresql-debuginforocky-upgrade-freeradius-restrocky-upgrade-freeradius-rest-debuginforocky-upgrade-freeradius-sqliterocky-upgrade-freeradius-sqlite-debuginforocky-upgrade-freeradius-unixodbcrocky-upgrade-freeradius-unixodbc-debuginforocky-upgrade-freeradius-utilsrocky-upgrade-freeradius-utils-debuginforocky-upgrade-krb5-debuginforocky-upgrade-krb5-debugsourcerocky-upgrade-krb5-develrocky-upgrade-krb5-devel-debuginforocky-upgrade-krb5-libsrocky-upgrade-krb5-libs-debuginforocky-upgrade-krb5-pkinitrocky-upgrade-krb5-pkinit-debuginforocky-upgrade-krb5-serverrocky-upgrade-krb5-server-debuginforocky-upgrade-krb5-server-ldaprocky-upgrade-krb5-server-ldap-debuginforocky-upgrade-krb5-workstationrocky-upgrade-krb5-workstation-debuginforocky-upgrade-libkadm5rocky-upgrade-libkadm5-debuginforocky-upgrade-python3-freeradiusrocky-upgrade-python3-freeradius-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.