Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-45142


The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding "!= 0" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.


Published

2023-03-06T23:15:11.233

Last Modified

2025-03-06T21:15:13.223

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-354
  • Type: Primary
    CWE-354

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application heimdal_project heimdal 7.7.1 Yes
Application heimdal_project heimdal 7.8.0 Yes

References