CVE-2017-6594

The transit path validation code in Heimdal before 7.3 might allow attackers to bypass the capath policy protection mechanism by leveraging failure to add the previous hop realm to the transit path of issued tickets.
Configurations

Configuration 1 (hide)

cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*

History

21 Nov 2024, 03:30

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2017-08/msg00062.html - Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2017-08/msg00062.html - Third Party Advisory
References () http://www.h5l.org/advisories.html?show=2017-04-13 - Vendor Advisory () http://www.h5l.org/advisories.html?show=2017-04-13 - Vendor Advisory
References () https://github.com/heimdal/heimdal/commit/b1e699103f08d6a0ca46a122193c9da65f6cf837 - Issue Tracking, Patch, Third Party Advisory () https://github.com/heimdal/heimdal/commit/b1e699103f08d6a0ca46a122193c9da65f6cf837 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/heimdal/heimdal/releases/tag/heimdal-7.3.0 - Issue Tracking, Patch, Third Party Advisory () https://github.com/heimdal/heimdal/releases/tag/heimdal-7.3.0 - Issue Tracking, Patch, Third Party Advisory

Information

Published : 2017-08-28 19:29

Updated : 2024-11-21 03:30


NVD link : CVE-2017-6594

Mitre link : CVE-2017-6594

CVE.ORG link : CVE-2017-6594


JSON object : View

Products Affected

heimdal_project

  • heimdal

opensuse

  • leap
CWE
CWE-295

Improper Certificate Validation