A stack-based buffer overflow in mangle_to_hex_lower() and mangle_to_hex_upper() in src/rp_cpu.c in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted rule file, or via the -j or -k rule options used with password candidates of 128 or more characters. The vulnerability is caused by a bounds check that fails to account for the 2x expansion that occurs when password bytes are converted to hexadecimal.
References
| Link | Resource |
|---|---|
| https://gist.github.com/sgInnora/107f2eb20367e47d58c911e38d56a91f | Exploit Mitigation Third Party Advisory |
Configurations
History
01 May 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-121 |
01 May 2026, 17:45
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://gist.github.com/sgInnora/107f2eb20367e47d58c911e38d56a91f - Exploit, Mitigation, Third Party Advisory | |
| CPE | cpe:2.3:a:hashcat:hashcat:7.1.2:*:*:*:*:*:*:* | |
| First Time |
Hashcat hashcat
Hashcat |
|
| CWE | CWE-787 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
01 May 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-05-01 14:16
Updated : 2026-05-01 19:16
NVD link : CVE-2026-42482
Mitre link : CVE-2026-42482
CVE.ORG link : CVE-2026-42482
JSON object : View
Products Affected
hashcat
- hashcat
