First published: Mon Aug 28 2017(Updated: )
The transit path validation code in Heimdal before 7.3 might allow attackers to bypass the capath policy protection mechanism by leveraging failure to add the previous hop realm to the transit path of issued tickets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
heimdal | <=7.2.0 | |
SUSE Linux | =42.2 | |
SUSE Linux | =42.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6594 is considered a medium severity vulnerability.
To fix CVE-2017-6594, upgrade the Heimdal software to version 7.3 or later.
CVE-2017-6594 affects Heimdal prior to version 7.3, as well as specific versions of openSUSE Leap 42.2 and 42.3.
CVE-2017-6594 is a vulnerability related to transit path validation in the Heimdal authentication protocols.
Yes, CVE-2017-6594 can potentially be exploited by attackers remotely if the conditions are met.