Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2017-7562 |
CWE-ID | CWE-592 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Kerberos 5 Client/Desktop applications / Software for system administration |
Vendor | MIT |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU12181
Risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-7562
CWE-ID:
CWE-592 - Authentication Bypass Issues
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated attacker to write arbitrary files on the target system.
The weakness exists due to an authentication bypass in the way krb5's certauth interface handled the validation of client certificates. A remote attacker can impersonate arbitrary principals under rare and erroneous circumstances.
Install update from vendor's website.
Vulnerable software versionsKerberos 5: 1.14 - 1.14.6
CPE2.3http://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7562
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.