Vulnerability Description
The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding "!= 0" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Heimdal Project | Heimdal | 7.7.1 |
Related Weaknesses (CWE)
References
- https://security.gentoo.org/glsa/202310-06
- https://www.openwall.com/lists/oss-security/2023/02/08/1Mailing List
- https://security.gentoo.org/glsa/202310-06
- https://www.openwall.com/lists/oss-security/2023/02/08/1Mailing List
FAQ
What is CVE-2022-45142?
CVE-2022-45142 is a vulnerability with a CVSS score of 7.5 (HIGH). The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding "!= 0" comparisons to the result of memcmp. When these patches were backported to t...
How severe is CVE-2022-45142?
CVE-2022-45142 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-45142?
Check the references section above for vendor advisories and patch information. Affected products include: Heimdal Project Heimdal.