The transit path validation code in Heimdal before 7.3 might allow attackers to bypass the capath policy protection mechanism by leveraging failure to add the previous hop realm to the transit path of issued tickets.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-updates/2017-08/msg00062.html | Third Party Advisory |
http://www.h5l.org/advisories.html?show=2017-04-13 | Vendor Advisory |
https://github.com/heimdal/heimdal/commit/b1e699103f08d6a0ca46a122193c9da65f6cf837 | Issue Tracking Patch Third Party Advisory |
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.3.0 | Issue Tracking Patch Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2017-08/msg00062.html | Third Party Advisory |
http://www.h5l.org/advisories.html?show=2017-04-13 | Vendor Advisory |
https://github.com/heimdal/heimdal/commit/b1e699103f08d6a0ca46a122193c9da65f6cf837 | Issue Tracking Patch Third Party Advisory |
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.3.0 | Issue Tracking Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-updates/2017-08/msg00062.html - Third Party Advisory | |
References | () http://www.h5l.org/advisories.html?show=2017-04-13 - Vendor Advisory | |
References | () https://github.com/heimdal/heimdal/commit/b1e699103f08d6a0ca46a122193c9da65f6cf837 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/heimdal/heimdal/releases/tag/heimdal-7.3.0 - Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2017-08-28 19:29
Updated : 2024-11-21 03:30
NVD link : CVE-2017-6594
Mitre link : CVE-2017-6594
CVE.ORG link : CVE-2017-6594
JSON object : View
Products Affected
heimdal_project
- heimdal
opensuse
- leap
CWE
CWE-295
Improper Certificate Validation