gss-ntlmssp is vulnerable to Denial of Service (DoS) attacks. Memory corruption can be triggered when decoding UTF16 strings if the variable ‘outlen’ is not initialized. This can lead to a denial of service if the write hits unmapped memory or randomly corrupts a byte in the application memory space. This vulnerability can be triggered via the main gss_accept_sec_context
entry point.