GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implements NTLM authentication. Prior to version 1.2.0, multiple out-of-bounds reads when decoding NTLM fields can trigger a denial of service. A 32-bit integer overflow condition can lead to incorrect checks of consistency of length of internal buffers. Although most applications will error out before accepting a singe input buffer of 4GB in length this could theoretically happen. This vulnerability can be triggered via the main gss_accept_sec_context entry point if the application allows tokens greater than 4GB in length. This can lead to a large, up to 65KB, out-of-bounds read which could cause a denial-of-service if it reads from unmapped memory. Version 1.2.0 contains a patch for the out-of-bounds reads.
{
"cwe_ids": [
"CWE-125"
],
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/25xxx/CVE-2023-25563.json",
"cna_assigner": "GitHub_M"
}{
"source": [
"CPE_FIELD",
"REFERENCES"
],
"cpe": "cpe:2.3:a:gss-ntlmssp_project:gss-ntlmssp:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "1.2.0"
}
]
}"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-25563.json"
"2026-04-16T03:34:50Z"
[
{
"signature_version": "v1",
"signature_type": "Function",
"id": "CVE-2023-25563-0edddb25",
"digest": {
"function_hash": "331006054786521764629428222756601935532",
"length": 658.0
},
"source": "https://github.com/gssapi/gss-ntlmssp/commit/97c62c6167299028d80765080e74d91dfc99efbd",
"target": {
"function": "ntlm_decode_u16l_str_hdr",
"file": "src/ntlm.c"
},
"deprecated": false
},
{
"signature_version": "v1",
"signature_type": "Function",
"id": "CVE-2023-25563-6b80705f",
"digest": {
"function_hash": "161093135126796711052096927497740976097",
"length": 478.0
},
"source": "https://github.com/gssapi/gss-ntlmssp/commit/97c62c6167299028d80765080e74d91dfc99efbd",
"target": {
"function": "ntlm_decode_oem_str",
"file": "src/ntlm.c"
},
"deprecated": false
},
{
"signature_version": "v1",
"signature_type": "Line",
"id": "CVE-2023-25563-803344ce",
"digest": {
"threshold": 0.9,
"line_hashes": [
"232127041754312028060875871013447268168",
"206292962879746650060716123714980279126",
"145025095548062189522269878168205040075",
"163790180433023315029162413659996935914",
"322856445154594983616252349157880715950",
"3208364079627860659488843816387450230",
"123321584524752210492664580188730908948",
"163790180433023315029162413659996935914",
"322856445154594983616252349157880715950",
"3208364079627860659488843816387450230",
"123321584524752210492664580188730908948",
"48482396070276096875480196614904444884",
"154018726546501964091814375835055159894",
"195977950093099683065394562741500765580",
"174826983254450284316015899969266938548"
]
},
"source": "https://github.com/gssapi/gss-ntlmssp/commit/97c62c6167299028d80765080e74d91dfc99efbd",
"target": {
"file": "src/ntlm.c"
},
"deprecated": false
},
{
"signature_version": "v1",
"signature_type": "Function",
"id": "CVE-2023-25563-b27a1b64",
"digest": {
"function_hash": "195035727235700941976133124570545362142",
"length": 540.0
},
"source": "https://github.com/gssapi/gss-ntlmssp/commit/97c62c6167299028d80765080e74d91dfc99efbd",
"target": {
"function": "ntlm_decode_field",
"file": "src/ntlm.c"
},
"deprecated": false
}
]