Lucene search

K
nvd[email protected]NVD:CVE-2022-42898
HistoryDec 25, 2022 - 6:15 a.m.

CVE-2022-42898

2022-12-2506:15:09
CWE-190
web.nvd.nist.gov
mit kerberos 5
pac parsing
integer overflow
remote code execution
denial of service
cve-2022-42898
heimdal

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.005 Low

EPSS

Percentile

76.3%

PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has “a similar bug.”

Affected configurations

NVD
Node
mitkerberos_5Range1.81.19.4
OR
mitkerberos_5Match1.20-
OR
mitkerberos_5Match1.20beta1
Node
heimdal_projectheimdalRange<7.7.1
Node
sambasambaRange<4.15.12
OR
sambasambaRange4.16.04.16.7
OR
sambasambaRange4.17.04.17.3

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.005 Low

EPSS

Percentile

76.3%