A heap-based buffer overflow in the Kerberos hash parser in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted Kerberos hash file. The issue affects module_hash_decode in multiple Kerberos-related modules because account_info_len is calculated from untrusted delimiter positions without upper-bound validation before memcpy copies the data into a fixed-size account_info buffer.
References
| Link | Resource |
|---|---|
| https://gist.github.com/sgInnora/107f2eb20367e47d58c911e38d56a91f | Exploit Mitigation Third Party Advisory |
| https://gist.github.com/sgInnora/107f2eb20367e47d58c911e38d56a91f | Exploit Mitigation Third Party Advisory |
Configurations
History
01 May 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://gist.github.com/sgInnora/107f2eb20367e47d58c911e38d56a91f - Exploit, Mitigation, Third Party Advisory | |
| CWE | CWE-122 |
01 May 2026, 17:45
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Hashcat hashcat
Hashcat |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CWE | CWE-787 | |
| References | () https://gist.github.com/sgInnora/107f2eb20367e47d58c911e38d56a91f - Exploit, Mitigation, Third Party Advisory | |
| CPE | cpe:2.3:a:hashcat:hashcat:7.1.2:*:*:*:*:*:*:* |
01 May 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-05-01 14:16
Updated : 2026-05-01 18:16
NVD link : CVE-2026-42483
Mitre link : CVE-2026-42483
CVE.ORG link : CVE-2026-42483
JSON object : View
Products Affected
hashcat
- hashcat
