Vulnerability Details : CVE-2020-10595
pam-krb5 before 4.9 has a buffer overflow that might cause remote code execution in situations involving supplemental prompting by a Kerberos library. It may overflow a buffer provided by the underlying Kerberos library by a single '\0' byte if an attacker responds to a prompt with an answer of a carefully chosen length. The effect may range from heap corruption to stack corruption depending on the structure of the underlying Kerberos library, with unknown effects but possibly including code execution. This code path is not used for normal authentication, but only when the Kerberos library does supplemental prompting, such as with PKINIT or when using the non-standard no_prompt PAM configuration option.
Vulnerability category: OverflowExecute code
Products affected by CVE-2020-10595
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:pam-krb5_project:pam-krb5:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-10595
4.62%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-10595
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2020-10595
-
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-10595
-
https://lists.debian.org/debian-lts-announce/2020/04/msg00000.html
[SECURITY] [DLA 2166-1] libpam-krb5 security updateMailing List;Third Party Advisory
-
https://github.com/rra/pam-krb5/commit/e7879e27a37119fad4faf133a9f70bdcdc75d760
Add CVE for buffer overflow security fix · rra/pam-krb5@e7879e2 · GitHubPatch;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2020/03/31/1
oss-security - pam-krb5 security advisory (4.9 and earlier)Mailing List;Patch;Third Party Advisory
-
https://www.eyrie.org/~eagle/software/pam-krb5/security/2020-03-30.html
pam-krb5 2020-03-30 Advisory
-
https://usn.ubuntu.com/4314-1/
USN-4314-1: pam-krb5 vulnerability | Ubuntu security notices
-
https://www.debian.org/security/2020/dsa-4648
Debian -- Security Information -- DSA-4648-1 libpam-krb5Third Party Advisory
Jump to