Vulnerability Details CVE-2023-25565
GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implements NTLM authentication. Prior to version 1.2.0, an incorrect free when decoding target information can trigger a denial of service. The error condition incorrectly assumes the `cb` and `sh` buffers contain a copy of the data that needs to be freed. However, that is not the case. This vulnerability can be triggered via the main `gss_accept_sec_context` entry point. This will likely trigger an assertion failure in `free`, causing a denial-of-service. This issue is fixed in version 1.2.0.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 21.6%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2023-25565
-
cpe:2.3:a:gss-ntlmssp_project:gss-ntlmssp:0.1.0
-
cpe:2.3:a:gss-ntlmssp_project:gss-ntlmssp:0.2.0
-
cpe:2.3:a:gss-ntlmssp_project:gss-ntlmssp:0.3.0
-
cpe:2.3:a:gss-ntlmssp_project:gss-ntlmssp:0.3.1
-
cpe:2.3:a:gss-ntlmssp_project:gss-ntlmssp:0.4.0
-
cpe:2.3:a:gss-ntlmssp_project:gss-ntlmssp:0.5.0
-
cpe:2.3:a:gss-ntlmssp_project:gss-ntlmssp:0.6.0
-
cpe:2.3:a:gss-ntlmssp_project:gss-ntlmssp:0.7.0
-
cpe:2.3:a:gss-ntlmssp_project:gss-ntlmssp:0.8.0
-
cpe:2.3:a:gss-ntlmssp_project:gss-ntlmssp:0.9.0
-
cpe:2.3:a:gss-ntlmssp_project:gss-ntlmssp:1.1.0