Lucene search

K
cve[email protected]CVE-2022-42898
HistoryDec 25, 2022 - 6:15 a.m.

CVE-2022-42898

2022-12-2506:15:09
CWE-190
web.nvd.nist.gov
693
2
cve-2022-42898
mit kerberos 5
krb5
pac parsing
integer overflows
remote code execution
denial of service
heap-based buffer overflow
nvd
security vulnerability

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.2 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

76.3%

PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has “a similar bug.”

Affected configurations

NVD
Node
mitkerberos_5Range1.81.19.4
OR
mitkerberos_5Match1.20-
OR
mitkerberos_5Match1.20beta1
Node
heimdal_projectheimdalRange<7.7.1
Node
sambasambaRange<4.15.12
OR
sambasambaRange4.16.04.16.7
OR
sambasambaRange4.17.04.17.3

Social References

More

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.2 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

76.3%