CVE-2023-25565
14.02.2023, 18:15
GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implements NTLM authentication. Prior to version 1.2.0, an incorrect free when decoding target information can trigger a denial of service. The error condition incorrectly assumes the `cb` and `sh` buffers contain a copy of the data that needs to be freed. However, that is not the case. This vulnerability can be triggered via the main `gss_accept_sec_context` entry point. This will likely trigger an assertion failure in `free`, causing a denial-of-service. This issue is fixed in version 1.2.0.Enginsight
Vendor | Product | Version |
---|---|---|
gss-ntlmssp_project | gss-ntlmssp | 𝑥 < 1.2.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
- CWE-590 - Free of Memory not on the HeapThe application calls free() on a pointer to memory that was not allocated using associated heap allocation functions such as malloc(), calloc(), or realloc().
- CWE-763 - Release of Invalid Pointer or ReferenceThe application attempts to return a memory resource to the system, but calls the wrong release function or calls the appropriate release function incorrectly.
References