Lucene search

K
ubuntucveUbuntu.comUB:CVE-2017-6594
HistoryAug 28, 2017 - 12:00 a.m.

CVE-2017-6594

2017-08-2800:00:00
ubuntu.com
ubuntu.com
7

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.002 Low

EPSS

Percentile

53.2%

The transit path validation code in Heimdal before 7.3 might allow
attackers to bypass the capath policy protection mechanism by leveraging
failure to add the previous hop realm to the transit path of issued
tickets.

Notes

Author Note
ratliff Upstream: “[the fix] may break sites that rely on the bug.”
mdeslaur heimdal-kdc package is in universe
ccdm94 in the commit that fixes this issue, upstream mentions that there might be applications that use this bug as a “feature” when sometimes authenticating in cross-realm configurations, meaning that applying the proposed fix could end up breaking said applications. In order to avoid regressions for applications that use heimdal in xenial and earlier, this issue will be marked as ignored for those releases.

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.002 Low

EPSS

Percentile

53.2%