CVE-2017-6594

NameCVE-2017-6594
DescriptionThe transit path validation code in Heimdal before 7.3 might allow attackers to bypass the capath policy protection mechanism by leveraging failure to add the previous hop realm to the transit path of issued tickets.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
heimdal (PTS)jessie, jessie (lts)1.6~rc2+dfsg-9+deb8u3vulnerable
stretch (security)7.1.0+dfsg-13+deb9u3fixed
stretch (lts), stretch7.1.0+dfsg-13+deb9u4fixed
buster7.5.0+dfsg-3fixed
buster (security)7.5.0+dfsg-3+deb10u2fixed
bullseye (security), bullseye7.7.0+dfsg-2+deb11u3fixed
bookworm7.8.git20221117.28daf24+dfsg-2fixed
sid, trixie7.8.git20221117.28daf24+dfsg-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
heimdalsource(unstable)7.1.0+dfsg-12

Notes

[wheezy] - heimdal <no-dsa> (Minor issue)
https://github.com/heimdal/heimdal/commit/b1e699103f08d6a0ca46a122193c9da65f6cf837
See https://lists.debian.org/debian-lts/2017/05/msg00010.html
[jessie] - heimdal <ignored> (In jessie an earlier, there are more bugs in transit path validation. One is fixed via 1501740952a815fbe10ab8345bb38cfb0ded9504. Therefore, fixing this CVE in jessie would risk breaking setups that rely on the buggy behaviour.)

Search for package or bug name: Reporting problems