Anolis OS update for krb5



Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-3596
CWE-ID CWE-327
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Anolis OS
Operating systems & Components / Operating system

libkadm5
Operating systems & Components / Operating system package or component

krb5-workstation
Operating systems & Components / Operating system package or component

krb5-server-ldap
Operating systems & Components / Operating system package or component

krb5-server
Operating systems & Components / Operating system package or component

krb5-pkinit
Operating systems & Components / Operating system package or component

krb5-libs
Operating systems & Components / Operating system package or component

krb5-devel
Operating systems & Components / Operating system package or component

Vendor OpenAnolis

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Use of a broken or risky cryptographic algorithm

EUVDB-ID: #VU94063

Risk: Medium

CVSSv4.0: 6.8 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2024-3596

CWE-ID: CWE-327 - Use of a Broken or Risky Cryptographic Algorithm

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to use of a broken or risky cryptographic algorithm in RADIUS Protocol. A remote user can perform a man-in-the-middle (MitM) attack and gain access to target system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 7

libkadm5: before 1.15.1-55.0.2

krb5-workstation: before 1.15.1-55.0.2

krb5-server-ldap: before 1.15.1-55.0.2

krb5-server: before 1.15.1-55.0.2

krb5-pkinit: before 1.15.1-55.0.2

krb5-libs: before 1.15.1-55.0.2

krb5-devel: before 1.15.1-55.0.2

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:1181


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###