CVE-2022-45142

EUVD-2022-48057
The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding "!= 0" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CISA-ADPADP
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 19%
Affected Products (NVD)
VendorProductVersion
heimdal_projectheimdal
7.7.1
heimdal_projectheimdal
7.8.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
heimdal
bookworm
7.8.git20221117.28daf24+dfsg-2
fixed
bullseye
7.7.0+dfsg-2+deb11u3
fixed
bullseye (security)
7.7.0+dfsg-2+deb11u3
fixed
sid
7.8.git20221117.28daf24+dfsg-8
fixed
trixie
7.8.git20221117.28daf24+dfsg-8
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
heimdal
bionic
Fixed 7.5.0+dfsg-1ubuntu0.4
released
focal
Fixed 7.7.0+dfsg-1ubuntu1.4
released
jammy
needs-triage
kinetic
ignored
lunar
ignored
mantic
ignored
noble
needed
trusty
Fixed 1.6~git20131207+dfsg-1ubuntu1.2+esm4
released
xenial
Fixed 1.7~git20150920+dfsg-4ubuntu1.16.04.1+esm4
released