Impact
The vulnerability is a NULL pointer dereference that occurs when an application invokes gss_accept_sec_context() on a Kerberos 5 system with a NegoEx mechanism registered in /etc/gss/mech. The flaw causes the process to crash during parse_nego_message, resulting in a denial of service for the affected service. The weakness is classified as CWE‑476 and does not provide code execution or data exfiltration capabilities. The impact is limited to service disruption.
Affected Systems
MIT Kerberos 5 (krb5) versions prior to 1.22.3 are affected. Systems that have a NegoEx mechanism registered in /etc/gss/mech are susceptible. The issue occurs on any platform running the affected Kerberos 5 implementation.
Risk and Exploitability
The CVSS base score of 5.9 indicates moderate severity. EPSS information is not available, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that an unauthenticated remote attacker can trigger the flaw by sending crafted network traffic that causes a Kerberos client or server to call gss_accept_sec_context() with the vulnerable NegoEx mechanism. Because the vulnerability does not require authentication, the attack vector likely involves remote network interaction, making it potentially exploitable against exposed Kerberos services.
OpenCVE Enrichment