First published: Sun Dec 25 2022(Updated: )
PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 | >=1.8<1.19.4 | |
MIT Kerberos 5 | =1.20 | |
MIT Kerberos 5 | =1.20-beta1 | |
Heimdal Project Heimdal | <7.7.1 | |
Samba Samba | <4.15.12 | |
Samba Samba | >=4.16.0<4.16.7 | |
Samba Samba | >=4.17.0<4.17.3 | |
debian/heimdal | <=7.5.0+dfsg-3 | 7.5.0+dfsg-3+deb10u2 7.7.0+dfsg-2+deb11u3 7.8.git20221117.28daf24+dfsg-2 7.8.git20221117.28daf24+dfsg-3 |
debian/krb5 | <=1.17-3+deb10u4 | 1.17-3+deb10u6 1.18.3-6+deb11u4 1.18.3-6+deb11u3 1.20.1-2+deb12u1 1.20.1-5 |
debian/samba | <=2:4.9.5+dfsg-5+deb10u3<=2:4.9.5+dfsg-5+deb10u4<=2:4.13.13+dfsg-1~deb11u5 | 2:4.17.12+dfsg-0+deb12u1 2:4.19.3+dfsg-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this security issue is CVE-2022-42898.
CVE-2022-42898 has a severity rating of 8.8 (High).
MIT Kerberos 5 versions before 1.19.4 and 1.20.x before 1.20.1 are affected.
CVE-2022-42898 can lead to remote code execution due to integer overflows in PAC parsing.
You can find more information about CVE-2022-42898 in the references provided: [link1] [link2] [link3].