PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."

Project Subscriptions

Vendors Products
Heimdal Project Subscribe
Heimdal Subscribe
Kerberos 5 Subscribe
Enterprise Linux Subscribe
Rhel Aus Subscribe
Rhel E4s Subscribe
Rhel Els Subscribe
Rhel Eus Subscribe
Rhel Tus Subscribe
Rhev Hypervisor Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3206-1 heimdal security update
Debian DLA Debian DLA DLA-3213-1 krb5 security update
Debian DSA Debian DSA DSA-5286-1 krb5 security update
Debian DSA Debian DSA DSA-5287-1 heimdal security update
EUVD EUVD EUVD-2022-45956 PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."
Ubuntu USN Ubuntu USN USN-5800-1 Heimdal vulnerabilities
Ubuntu USN Ubuntu USN USN-5822-1 Samba vulnerabilities
Ubuntu USN Ubuntu USN USN-5828-1 Kerberos vulnerabilities
Ubuntu USN Ubuntu USN USN-5936-1 Samba vulnerabilities
Ubuntu USN Ubuntu USN USN-7582-1 Samba vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 14 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-04-14T18:33:09.110Z

Reserved: 2022-10-13T00:00:00.000Z

Link: CVE-2022-42898

cve-icon Vulnrichment

Updated: 2024-08-03T13:19:05.317Z

cve-icon NVD

Status : Modified

Published: 2022-12-25T06:15:09.427

Modified: 2025-04-14T19:15:31.810

Link: CVE-2022-42898

cve-icon Redhat

Severity : Important

Publid Date: 2022-11-15T00:00:00Z

Links: CVE-2022-42898 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses