CVE-2022-42898

Source
https://cve.org/CVERecord?id=CVE-2022-42898
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-42898.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-42898
Downstream
Related
Published
2022-12-25T06:15:09.427Z
Modified
2026-02-18T00:30:25.469412Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5pacparse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."

References

Affected packages

Git / github.com/krb5/krb5

Affected ranges

Type
GIT
Repo
https://github.com/krb5/krb5
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

vanir_signatures
[
    {
        "target": {
            "function": "main",
            "file": "src/lib/krb5/krb/t_pac.c"
        },
        "source": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583",
        "id": "CVE-2022-42898-190ec2e6",
        "signature_version": "v1",
        "digest": {
            "function_hash": "313212553996591129015720005043578260600",
            "length": 8101.0
        },
        "deprecated": false,
        "signature_type": "Function"
    },
    {
        "target": {
            "file": "src/lib/krb5/krb/pac.c"
        },
        "source": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583",
        "id": "CVE-2022-42898-1a970be7",
        "signature_version": "v1",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "47415333018243679864646462913306600925",
                "113522990652075189899911575550870172940",
                "332636347402384035849490568060121070816",
                "24974974711904770793287531419649756654",
                "34036481326062071104848288339706052122",
                "335906234459261617987938532306053980177",
                "154732096699152609497200721234291993685",
                "185833400480707633037073703290605393751",
                "114563188656008062785041387091874740449",
                "258667828208263873189321892773311252565",
                "259921342012297268374246674019195512093"
            ]
        },
        "deprecated": false,
        "signature_type": "Line"
    },
    {
        "target": {
            "file": "src/lib/krb5/krb/t_pac.c"
        },
        "source": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583",
        "id": "CVE-2022-42898-705fc6fd",
        "signature_version": "v1",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "203158983188195784883759796692003894593",
                "117811727424344157626574231154516038039",
                "275952240584579959483060309342236230792",
                "87998220430651193888088689122468582815",
                "198618692815112439499828060074676714596",
                "86990030903086973170313960916416642456"
            ]
        },
        "deprecated": false,
        "signature_type": "Line"
    },
    {
        "target": {
            "function": "krb5_pac_parse",
            "file": "src/lib/krb5/krb/pac.c"
        },
        "source": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583",
        "id": "CVE-2022-42898-d3714872",
        "signature_version": "v1",
        "digest": {
            "function_hash": "141063196662638433845114500023813850879",
            "length": 1490.0
        },
        "deprecated": false,
        "signature_type": "Function"
    }
]
source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-42898.json"

Git / github.com/samba-team/samba

Affected versions

ldb-2.*
ldb-2.5.1
ldb-2.5.2
samba-4.*
samba-4.16.0
samba-4.16.1
samba-4.16.2
samba-4.16.3
samba-4.16.4
samba-4.16.5
samba-4.16.6
samba-4.17.0
samba-4.17.1
samba-4.17.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-42898.json"