The transit path validation code in Heimdal before 7.3 might allow attackers to bypass the capath policy protection mechanism by leveraging failure to add the previous hop realm to the transit path of issued tickets.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-updates/2017-08/msg00062.html | Third Party Advisory |
http://www.h5l.org/advisories.html?show=2017-04-13 | Vendor Advisory |
https://github.com/heimdal/heimdal/commit/b1e699103f08d6a0ca46a122193c9da65f6cf837 | Issue Tracking Patch Third Party Advisory |
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.3.0 | Issue Tracking Patch Third Party Advisory |
Configurations
History
12 Aug 2021, 17:50
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:h5l:heimdal:*:*:*:*:*:*:*:* |
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:* cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:* |
Information
Published : 2017-08-28 19:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-6594
Mitre link : CVE-2017-6594
CVE.ORG link : CVE-2017-6594
JSON object : View
Products Affected
heimdal_project
- heimdal
opensuse
- leap
CWE
CWE-295
Improper Certificate Validation