Out-of-bounds Read Affecting gssapi/gss-ntlmssp package, versions [,1.2.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.44% (61st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-GSSAPIGSSNTLMSSP-3319949
  • published15 Feb 2023
  • disclosed15 Feb 2023
  • creditphilipturnbull

Introduced: 15 Feb 2023

CVE-2023-25563  (opens in a new tab)
CWE-125  (opens in a new tab)

How to fix?

Upgrade gssapi/gss-ntlmssp to version 1.2.0 or higher.

Overview

Affected versions of this package are vulnerable to Out-of-bounds Read when decoding NTLM fields. A 32-bit integer overflow condition can lead to incorrect checks of the consistency of the length of internal buffers. Although most applications will error out before accepting a single input buffer of 4GB in length this could theoretically happen. This vulnerability can be triggered via the main gss_accept_sec_context entry point if the application allows tokens greater than 4GB in length.

CVSS Base Scores

version 3.1