CVE-2026-42483

A heap-based buffer overflow in the Kerberos hash parser in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted Kerberos hash file. The issue affects module_hash_decode in multiple Kerberos-related modules because account_info_len is calculated from untrusted delimiter positions without upper-bound validation before memcpy copies the data into a fixed-size account_info buffer.
References
Link Resource
https://gist.github.com/sgInnora/107f2eb20367e47d58c911e38d56a91f Exploit Mitigation Third Party Advisory
https://gist.github.com/sgInnora/107f2eb20367e47d58c911e38d56a91f Exploit Mitigation Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:hashcat:hashcat:7.1.2:*:*:*:*:*:*:*

History

01 May 2026, 18:16

Type Values Removed Values Added
References () https://gist.github.com/sgInnora/107f2eb20367e47d58c911e38d56a91f - Exploit, Mitigation, Third Party Advisory () https://gist.github.com/sgInnora/107f2eb20367e47d58c911e38d56a91f - Exploit, Mitigation, Third Party Advisory
CWE CWE-122

01 May 2026, 17:45

Type Values Removed Values Added
First Time Hashcat hashcat
Hashcat
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-787
References () https://gist.github.com/sgInnora/107f2eb20367e47d58c911e38d56a91f - () https://gist.github.com/sgInnora/107f2eb20367e47d58c911e38d56a91f - Exploit, Mitigation, Third Party Advisory
CPE cpe:2.3:a:hashcat:hashcat:7.1.2:*:*:*:*:*:*:*

01 May 2026, 14:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-05-01 14:16

Updated : 2026-05-01 18:16


NVD link : CVE-2026-42483

Mitre link : CVE-2026-42483

CVE.ORG link : CVE-2026-42483


JSON object : View

Products Affected

hashcat

  • hashcat
CWE
CWE-787

Out-of-bounds Write

CWE-122

Heap-based Buffer Overflow