Vulnerability Name: | CVE-2022-42898 (CCN-240325) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2022-11-15 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2022-11-15 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2023-02-23 | ||||||||||||||||||||||||||||||||||||||||
Summary: | PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug." | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
5.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C)
7.7 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:S/C:P/I:C/A:P)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-190 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-42898 Source: cve@mitre.org Type: Exploit, Issue Tracking, Patch, Third Party Advisory cve@mitre.org Source: XF Type: UNKNOWN samba-cve202242898-bo(240325) Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Patch, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: UNKNOWN cve@mitre.org Source: cve@mitre.org Type: UNKNOWN cve@mitre.org Source: cve@mitre.org Type: Vendor Advisory cve@mitre.org Source: cve@mitre.org Type: Release Notes, Vendor Advisory cve@mitre.org Source: cve@mitre.org Type: Vendor Advisory cve@mitre.org Source: CCN Type: Samba Web site Samba buffer overflow vulnerabilities on 32-bit systems Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |