Vulnerability identifier: #VU12181
Vulnerability risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-592
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Kerberos 5
Client/Desktop applications /
Software for system administration
Vendor: MIT
Description
The vulnerability allows a remote authenticated attacker to write arbitrary files on the target system.
The weakness exists due to an authentication bypass in the way krb5's certauth interface handled the validation of client certificates. A remote attacker can impersonate arbitrary principals under rare and erroneous circumstances.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Kerberos 5: 1.14 - 1.14.6
External links
http://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7562
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.