CVE-2023-25563

Source
https://cve.org/CVERecord?id=CVE-2023-25563
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-25563.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-25563
Aliases
  • GHSA-jjjx-5qf7-9mgf
Downstream
Related
Published
2023-02-14T17:35:08.172Z
Modified
2026-04-16T03:34:50.682874Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
GSS-NTLMSSP vulnerable to multiple out-of-bounds reads when decoding NTLM fields
Details

GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implements NTLM authentication. Prior to version 1.2.0, multiple out-of-bounds reads when decoding NTLM fields can trigger a denial of service. A 32-bit integer overflow condition can lead to incorrect checks of consistency of length of internal buffers. Although most applications will error out before accepting a singe input buffer of 4GB in length this could theoretically happen. This vulnerability can be triggered via the main gss_accept_sec_context entry point if the application allows tokens greater than 4GB in length. This can lead to a large, up to 65KB, out-of-bounds read which could cause a denial-of-service if it reads from unmapped memory. Version 1.2.0 contains a patch for the out-of-bounds reads.

Database specific
{
    "cwe_ids": [
        "CWE-125"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/25xxx/CVE-2023-25563.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/gssapi/gss-ntlmssp

Affected ranges

Type
GIT
Repo
https://github.com/gssapi/gss-ntlmssp
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Database specific
{
    "source": [
        "CPE_FIELD",
        "REFERENCES"
    ],
    "cpe": "cpe:2.3:a:gss-ntlmssp_project:gss-ntlmssp:*:*:*:*:*:*:*:*",
    "extracted_events": [
        {
            "introduced": "0"
        },
        {
            "fixed": "1.2.0"
        }
    ]
}

Affected versions

0.*
0.8.0
v0.*
v0.1.0
v0.2.0
v0.3.0
v0.3.1
v0.4.0
v0.5.0
v0.6.0
v0.7.0
v0.8.0
v0.9.0
v1.*
v1.0.0
v1.1.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-25563.json"
vanir_signatures_modified
"2026-04-16T03:34:50Z"
vanir_signatures
[
    {
        "signature_version": "v1",
        "signature_type": "Function",
        "id": "CVE-2023-25563-0edddb25",
        "digest": {
            "function_hash": "331006054786521764629428222756601935532",
            "length": 658.0
        },
        "source": "https://github.com/gssapi/gss-ntlmssp/commit/97c62c6167299028d80765080e74d91dfc99efbd",
        "target": {
            "function": "ntlm_decode_u16l_str_hdr",
            "file": "src/ntlm.c"
        },
        "deprecated": false
    },
    {
        "signature_version": "v1",
        "signature_type": "Function",
        "id": "CVE-2023-25563-6b80705f",
        "digest": {
            "function_hash": "161093135126796711052096927497740976097",
            "length": 478.0
        },
        "source": "https://github.com/gssapi/gss-ntlmssp/commit/97c62c6167299028d80765080e74d91dfc99efbd",
        "target": {
            "function": "ntlm_decode_oem_str",
            "file": "src/ntlm.c"
        },
        "deprecated": false
    },
    {
        "signature_version": "v1",
        "signature_type": "Line",
        "id": "CVE-2023-25563-803344ce",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "232127041754312028060875871013447268168",
                "206292962879746650060716123714980279126",
                "145025095548062189522269878168205040075",
                "163790180433023315029162413659996935914",
                "322856445154594983616252349157880715950",
                "3208364079627860659488843816387450230",
                "123321584524752210492664580188730908948",
                "163790180433023315029162413659996935914",
                "322856445154594983616252349157880715950",
                "3208364079627860659488843816387450230",
                "123321584524752210492664580188730908948",
                "48482396070276096875480196614904444884",
                "154018726546501964091814375835055159894",
                "195977950093099683065394562741500765580",
                "174826983254450284316015899969266938548"
            ]
        },
        "source": "https://github.com/gssapi/gss-ntlmssp/commit/97c62c6167299028d80765080e74d91dfc99efbd",
        "target": {
            "file": "src/ntlm.c"
        },
        "deprecated": false
    },
    {
        "signature_version": "v1",
        "signature_type": "Function",
        "id": "CVE-2023-25563-b27a1b64",
        "digest": {
            "function_hash": "195035727235700941976133124570545362142",
            "length": 540.0
        },
        "source": "https://github.com/gssapi/gss-ntlmssp/commit/97c62c6167299028d80765080e74d91dfc99efbd",
        "target": {
            "function": "ntlm_decode_field",
            "file": "src/ntlm.c"
        },
        "deprecated": false
    }
]