#VU12181 Authentication bypass in Kerberos 5


Published: 2018-04-25

Vulnerability identifier: #VU12181

Vulnerability risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-7562

CWE-ID: CWE-592

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Kerberos 5
Client/Desktop applications / Software for system administration

Vendor: MIT

Description
The vulnerability allows a remote authenticated attacker to write arbitrary files on the target system.

The weakness exists due to an authentication bypass in the way krb5's certauth interface handled the validation of client certificates. A remote attacker can impersonate arbitrary principals under rare and erroneous circumstances.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Kerberos 5: 1.14 - 1.14.6


External links
http://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7562


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability