Lucene search

K
redhatRedHatRHSA-2023:3097
HistoryMay 16, 2023 - 9:15 a.m.

(RHSA-2023:3097) Moderate: gssntlmssp security update

2023-05-1609:15:20
access.redhat.com
8
gssntlmssp
gssapi
ntlm
authentication
out-of-bounds read
memory corruption
incorrect free
memory leak
cve-2023-25563
cve-2023-25564
cve-2023-25565
cve-2023-25566
cve-2023-25567
cvss score
unix

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

EPSS

0.001

Percentile

45.8%

The gssntlmssp is a GSSAPI NTLM mechanism that allows to perform NTLM authentication in GSSAPI programs.

Security Fix(es):

  • gssntlmssp: multiple out-of-bounds read when decoding NTLM fields (CVE-2023-25563)

  • gssntlmssp: memory corruption when decoding UTF16 strings (CVE-2023-25564)

  • gssntlmssp: incorrect free when decoding target information (CVE-2023-25565)

  • gssntlmssp: memory leak when parsing usernames (CVE-2023-25566)

  • gssntlmssp: out-of-bounds read when decoding target information (CVE-2023-25567)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

EPSS

0.001

Percentile

45.8%