The transit path validation code in Heimdal before 7.3 might allow attackers to bypass the capath policy protection mechanism by leveraging failure to add the previous hop realm to the transit path of issued tickets.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-updates/2017-08/msg00062.html | Third Party Advisory |
http://www.h5l.org/advisories.html?show=2017-04-13 | Vendor Advisory |
https://github.com/heimdal/heimdal/commit/b1e699103f08d6a0ca46a122193c9da65f6cf837 | Issue Tracking Patch Third Party Advisory |
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.3.0 | Issue Tracking Patch Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2017-08/msg00062.html | Third Party Advisory |
http://www.h5l.org/advisories.html?show=2017-04-13 | Vendor Advisory |
https://github.com/heimdal/heimdal/commit/b1e699103f08d6a0ca46a122193c9da65f6cf837 | Issue Tracking Patch Third Party Advisory |
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.3.0 | Issue Tracking Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-08-28 19:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-6594
Mitre link : CVE-2017-6594
CVE.ORG link : CVE-2017-6594
JSON object : View
Products Affected
opensuse
- leap
heimdal_project
- heimdal
CWE
CWE-295
Improper Certificate Validation