Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
GSS-NTLMSSP vulnerable to memory corruption when decoding UTF16 strings
Vulnerability Description
GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implements NTLM authentication. Prior to version 1.2.0, memory corruption can be triggered when decoding UTF16 strings. The variable `outlen` was not initialized and could cause writing a zero to an arbitrary place in memory if `ntlm_str_convert()` were to fail, which would leave `outlen` uninitialized. This can lead to a denial of service if the write hits unmapped memory or randomly corrupts a byte in the application memory space. This vulnerability can trigger an out-of-bounds write, leading to memory corruption. This vulnerability can be triggered via the main `gss_accept_sec_context` entry point. This issue is fixed in version 1.2.0.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
Vulnerability Type
跨界内存写
Vulnerability Title
GSS-NTLMSSP 缓冲区错误漏洞
Vulnerability Description
GSS-NTLMSSP是gssapi开源的一个实现 NTLM 身份验证的 GSSAPI 库的 mechglue 插件。 GSS-NTLMSSP 1.2.0之前版本存在缓冲区错误漏洞,该漏洞源于如果 ntlm_str_convert() 失败,可能导致将零写入内存中的任意位置,这将使 outlen 未初始化,如果写入命中未映射的内存或随机损坏应用程序内存空间中的一个字节,这可能会导致拒绝服务,攻击者可以通过“gss_accept_sec_context”主入口点触发该漏洞。
CVSS Information
N/A
Vulnerability Type
N/A