Vulnerability Description
The transit path validation code in Heimdal before 7.3 might allow attackers to bypass the capath policy protection mechanism by leveraging failure to add the previous hop realm to the transit path of issued tickets.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Heimdal Project | Heimdal | <= 7.2.0 |
| Opensuse | Leap | 42.2 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-updates/2017-08/msg00062.htmlThird Party Advisory
- http://www.h5l.org/advisories.html?show=2017-04-13Vendor Advisory
- https://github.com/heimdal/heimdal/commit/b1e699103f08d6a0ca46a122193c9da65f6cf8Issue TrackingPatchThird Party Advisory
- https://github.com/heimdal/heimdal/releases/tag/heimdal-7.3.0Issue TrackingPatchThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2017-08/msg00062.htmlThird Party Advisory
- http://www.h5l.org/advisories.html?show=2017-04-13Vendor Advisory
- https://github.com/heimdal/heimdal/commit/b1e699103f08d6a0ca46a122193c9da65f6cf8Issue TrackingPatchThird Party Advisory
- https://github.com/heimdal/heimdal/releases/tag/heimdal-7.3.0Issue TrackingPatchThird Party Advisory
FAQ
What is CVE-2017-6594?
CVE-2017-6594 is a vulnerability with a CVSS score of 7.5 (HIGH). The transit path validation code in Heimdal before 7.3 might allow attackers to bypass the capath policy protection mechanism by leveraging failure to add the previous hop realm to the transit path of...
How severe is CVE-2017-6594?
CVE-2017-6594 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-6594?
Check the references section above for vendor advisories and patch information. Affected products include: Heimdal Project Heimdal, Opensuse Leap.