Unrated severityNVD Advisory· Published Feb 14, 2023· Updated Mar 10, 2025
GSS-NTLMSSP vulnerable to memory leak when parsing usernames
CVE-2023-25566
Description
GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implements NTLM authentication. Prior to version 1.2.0, a memory leak can be triggered when parsing usernames which can trigger a denial-of-service. The domain portion of a username may be overridden causing an allocated memory area the size of the domain name to be leaked. An attacker can leak memory via the main gss_accept_sec_context entry point, potentially causing a denial-of-service. This issue is fixed in version 1.2.0.
Affected products
1- Range: < 1.2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/gssapi/gss-ntlmssp/commit/8660fb16474054e692a596e9c79670cd4d3954f4mitrex_refsource_MISC
- github.com/gssapi/gss-ntlmssp/releases/tag/v1.2.0mitrex_refsource_MISC
- github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-mfm4-6g58-jw74mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.