Total vulnerabilities in the database
An authentication bypass flaw was found in the way krb5's certauth interface before 1.16.1 handled the validation of client certificates. A remote attacker able to communicate with the KDC could potentially use this flaw to impersonate arbitrary principals under rare and erroneous circumstances.
Software | From | Fixed in |
---|---|---|
redhat / enterprise_linux_desktop | 7.0 | 7.0.x |
redhat / enterprise_linux_workstation | 7.0 | 7.0.x |
redhat / enterprise_linux | 7.0 | 7.0.x |
redhat / enterprise_linux_server | 7.0 | 7.0.x |
mit / kerberos_5 | 1.0 | 1.16.1 |