Home

Description

A stack-based buffer overflow in mangle_to_hex_lower() and mangle_to_hex_upper() in src/rp_cpu.c in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted rule file, or via the -j or -k rule options used with password candidates of 128 or more characters. The vulnerability is caused by a bounds check that fails to account for the 2x expansion that occurs when password bytes are converted to hexadecimal.

PUBLISHED Reserved 2026-04-27 | Published 2026-05-01 | Updated 2026-05-01 | Assigner mitre

References

gist.github.com/sgInnora/107f2eb20367e47d58c911e38d56a91f

cve.org (CVE-2026-42482)

nvd.nist.gov (CVE-2026-42482)

Download JSON