PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5pacparse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."
{ "vanir_signatures": [ { "signature_version": "v1", "source": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583", "deprecated": false, "id": "CVE-2022-42898-190ec2e6", "signature_type": "Function", "digest": { "length": 8101.0, "function_hash": "313212553996591129015720005043578260600" }, "target": { "file": "src/lib/krb5/krb/t_pac.c", "function": "main" } }, { "signature_version": "v1", "source": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583", "deprecated": false, "id": "CVE-2022-42898-1a970be7", "signature_type": "Line", "digest": { "threshold": 0.9, "line_hashes": [ "47415333018243679864646462913306600925", "113522990652075189899911575550870172940", "332636347402384035849490568060121070816", "24974974711904770793287531419649756654", "34036481326062071104848288339706052122", "335906234459261617987938532306053980177", "154732096699152609497200721234291993685", "185833400480707633037073703290605393751", "114563188656008062785041387091874740449", "258667828208263873189321892773311252565", "259921342012297268374246674019195512093" ] }, "target": { "file": "src/lib/krb5/krb/pac.c" } }, { "signature_version": "v1", "source": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583", "deprecated": false, "id": "CVE-2022-42898-705fc6fd", "signature_type": "Line", "digest": { "threshold": 0.9, "line_hashes": [ "203158983188195784883759796692003894593", "117811727424344157626574231154516038039", "275952240584579959483060309342236230792", "87998220430651193888088689122468582815", "198618692815112439499828060074676714596", "86990030903086973170313960916416642456" ] }, "target": { "file": "src/lib/krb5/krb/t_pac.c" } }, { "signature_version": "v1", "source": "https://github.com/heimdal/heimdal/commit/78077c39e355766221383ee48c8b9be0459a82a4", "deprecated": false, "id": "CVE-2022-42898-7e74d481", "signature_type": "Line", "digest": { "threshold": 0.9, "line_hashes": [ "185684756605390238103334007784352789624", "7131579695216385856922531758292910060", "96067565823201056646313325968740529266", "307324062224806380958204996069287421659" ] }, "target": { "file": "include/bits.c" } }, { "signature_version": "v1", "source": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583", "deprecated": false, "id": "CVE-2022-42898-d3714872", "signature_type": "Function", "digest": { "length": 1490.0, "function_hash": "141063196662638433845114500023813850879" }, "target": { "file": "src/lib/krb5/krb/pac.c", "function": "krb5_pac_parse" } } ] }