CVE-2017-6594
Publication date 28 August 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
The transit path validation code in Heimdal before 7.3 might allow attackers to bypass the capath policy protection mechanism by leveraging failure to add the previous hop realm to the transit path of issued tickets.
Status
Package | Ubuntu Release | Status |
---|---|---|
heimdal | ||
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial | Ignored regressions likely | |
14.04 LTS trusty | Ignored regressions likely | |
Notes
ratliff
Upstream: "[the fix] may break sites that rely on the bug."
mdeslaur
heimdal-kdc package is in universe
ccdm94
in the commit that fixes this issue, upstream mentions that there might be applications that use this bug as a "feature" when sometimes authenticating in cross-realm configurations, meaning that applying the proposed fix could end up breaking said applications. In order to avoid regressions for applications that use heimdal in xenial and earlier, this issue will be marked as ignored for those releases.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |