CVE-2022-42898
NixOS vulnerability analysis and mitigation

Overview

PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms, and cause a denial of service on other platforms. The vulnerability was discovered in late 2022 and affects the krb5pacparse function in lib/krb5/krb/pac.c. Heimdal before 7.7.1 was also found to have a similar vulnerability (MIT Krb5 Commit, Samba Advisory).

Technical details

The vulnerability stems from integer multiplication overflow when calculating how many bytes to allocate for a buffer for the parsed PAC. On 32-bit systems, an overflow allows placement of 16-byte chunks of entirely attacker-controlled data, resulting in a heap-based buffer overflow. The server most vulnerable is the KDC, as it will parse an attacker-controlled PAC in the S4U2Proxy handler. The issue occurs specifically in the krb5pacparse function in lib/krb5/krb/pac.c (Samba Advisory, MIT Krb5 Commit).

Impact

The impact varies depending on the platform architecture. On 32-bit platforms, the vulnerability could lead to remote code execution in KDC, kadmind, or GSS/Kerberos application server processes. On other platforms, it primarily results in a denial of service condition. The vulnerability is particularly severe for KDC servers as they process attacker-controlled PACs in S4U2Proxy handlers. Secondary risk exists for Kerberos-enabled file server installations in non-AD realms (Samba Advisory, NVD).

Mitigation and workarounds

The vulnerability has been fixed in MIT Kerberos 5 version 1.19.4 and 1.20.1, and Heimdal version 7.7.1. For 32-bit systems running as an AD DC, there is no workaround other than upgrading. File servers are only impacted if they are in a non-AD domain. 64-bit systems are not exploitable through this vulnerability. Organizations should upgrade to the patched versions as soon as possible (Samba Advisory, MIT Krb5 Release).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61619HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-61618HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-61617HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-61610HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-65622MEDIUM5.4
  • PHPPHP
  • snipe-it
NoYesDec 01, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management