7.5
CVSSv3

CVE-2022-45142

Published: 06/03/2023 Updated: 08/10/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding "!= 0" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

heimdal project heimdal 7.8.0

heimdal project heimdal 7.7.1

Vendor Advisories

Debian Bug report logs - #1030849 CVE-2022-45142: accidental logic inversion in signature verification in gsskrb5 Package: src:heimdal; Maintainer for src:heimdal is Brian May <bam@debianorg>; Reported by: Helmut Grohne <helmut@subdivide> Date: Wed, 8 Feb 2023 11:45:14 UTC Severity: grave Tags: upstream Found in ...
Helmut Grohne discovered a flaw in Heimdal, an implementation of Kerberos 5 that aims to be compatible with MIT Kerberos The backports of fixes for CVE-2022-3437 accidentally inverted important memory comparisons in the arcfour-hmac-md5 and rc4-hmac integrity check handlers for gssapi, resulting in incorrect validation of message integrity codes ...
Description<!----> This CVE is under investigation by Red Hat Product Security ...