PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5pacparse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."
{
"license": "CC-BY-4.0",
"sources": [
{
"imported": "2026-04-13T14:12:33.226Z",
"id": "CVE-2022-42898",
"published": "2022-12-25T06:15:09.427Z",
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2022-42898",
"modified": "2025-04-14T19:15:31.810Z",
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42898"
}
]
}