PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5pacparse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."
[
{
"deprecated": false,
"source": "https://github.com/heimdal/heimdal/commit/78077c39e355766221383ee48c8b9be0459a82a4",
"id": "CVE-2022-42898-7e74d481",
"target": {
"file": "include/bits.c"
},
"digest": {
"line_hashes": [
"185684756605390238103334007784352789624",
"7131579695216385856922531758292910060",
"96067565823201056646313325968740529266",
"307324062224806380958204996069287421659"
],
"threshold": 0.9
},
"signature_type": "Line",
"signature_version": "v1"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-42898.json"