vulnerability
FreeBSD: VID-420243e9-a840-11e7-b5af-a4badb2f4699 (CVE-2017-1110): FreeBSD -- heimdal KDC-REP service name validation vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:L/Au:S/C:P/I:N/A:N) | Oct 3, 2017 | Oct 3, 2017 | Dec 10, 2025 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:P/I:N/A:N)
Published
Oct 3, 2017
Added
Oct 3, 2017
Modified
Dec 10, 2025
Description
Problem Description: There is a programming error in the Heimdal implementation that used an unauthenticated, plain-text version of the KDC-REP service name found in a ticket. Impact: An attacker who has control of the network between a client and the service it talks to will be able to impersonate the service, allowing a successful man-in-the-middle (MITM) attack that circumvents the mutual authentication.
Solutions
freebsd-upgrade-base-11_0-release-p11freebsd-upgrade-base-10_3-release-p20
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.