9.8
CVSSv3

CVE-2020-10595

Published: 31/03/2020 Updated: 04/04/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

pam-krb5 prior to 4.9 has a buffer overflow that might cause remote code execution in situations involving supplemental prompting by a Kerberos library. It may overflow a buffer provided by the underlying Kerberos library by a single '\0' byte if an attacker responds to a prompt with an answer of a carefully chosen length. The effect may range from heap corruption to stack corruption depending on the structure of the underlying Kerberos library, with unknown effects but possibly including code execution. This code path is not used for normal authentication, but only when the Kerberos library does supplemental prompting, such as with PKINIT or when using the non-standard no_prompt PAM configuration option.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pam-krb5 project pam-krb5

debian debian linux 8.0

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

pam-krb5 could be made to execute arbitrary code if it received a specially crafted response ...
Russ Allbery discovered a buffer overflow in the PAM module for MIT Kerberos, which could result in denial of service or potentially the execution of arbitrary code For the oldstable distribution (stretch), this problem has been fixed in version 47-4+deb9u1 For the stable distribution (buster), this problem has been fixed in version 48-2+deb10u ...
A heap-based one-byte out-of-bounds write has been found in pam-krb5 before 49 During prompting initiated by the Kerberos library, an attacker who enters a response exactly as long as the length of the buffer provided by the underlying Kerberos library will cause pam-krb5 to write a single nul byte past the end of that buffer The effect of this ...