• CVE-2023-25564

发布时间: 2023年2月24日

修改时间: 2024年10月31日

概要

GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implements NTLM authentication. Prior to version 1.2.0, memory corruption can be triggered when decoding UTF16 strings. The variable `outlen` was not initialized and could cause writing a zero to an arbitrary place in memory if `ntlm_str_convert()` were to fail, which would leave `outlen` uninitialized. This can lead to a denial of service if the write hits unmapped memory or randomly corrupts a byte in the application memory space. This vulnerability can trigger an out-of-bounds write, leading to memory corruption. This vulnerability can be triggered via the main `gss_accept_sec_context` entry point. This issue is fixed in version 1.2.0.

CVSS v3 指标

NVD openEuler
Confidentiality None None
Attack Vector Network Network
CVSS评分 8.2 6.5
Attack Complexity Low High
Privileges Required None None
Scope Unchanged Unchanged
Integrity Low Low
User Interaction None None
Availability High High

安全公告

公告名 概要 发布时间
KylinSec-SA-2023-1112 gssntlmssp security update 2023年2月24日

影响产品

产品 状态
KY3.4-4A gssntlmssp Fixed
KY3.4-5A gssntlmssp Fixed
KY3.5.1 gssntlmssp Fixed
KY3.5.2 gssntlmssp Fixed