The transit path validation code in Heimdal before 7.3 might allow attackers to bypass the capath policy protection mechanism by leveraging failure to add the previous hop realm to the transit path of issued tickets.
References
Link | Resource |
---|---|
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.3.0 | Issue Tracking Patch Third Party Advisory |
https://github.com/heimdal/heimdal/commit/b1e699103f08d6a0ca46a122193c9da65f6cf837 | Issue Tracking Patch Third Party Advisory |
http://www.h5l.org/advisories.html?show=2017-04-13 | Vendor Advisory |
http://lists.opensuse.org/opensuse-updates/2017-08/msg00062.html | Third Party Advisory |
Information
Published : 2017-08-28 12:29
Updated : 2021-08-12 10:50
NVD link : CVE-2017-6594
Mitre link : CVE-2017-6594
JSON object : View
CWE
CWE-295
Improper Certificate Validation
Products Affected
heimdal_project
- heimdal
opensuse
- leap