Home

Description

A heap-based buffer overflow in the Kerberos hash parser in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted Kerberos hash file. The issue affects module_hash_decode in multiple Kerberos-related modules because account_info_len is calculated from untrusted delimiter positions without upper-bound validation before memcpy copies the data into a fixed-size account_info buffer.

PUBLISHED Reserved 2026-04-27 | Published 2026-05-01 | Updated 2026-05-01 | Assigner mitre

References

gist.github.com/sgInnora/107f2eb20367e47d58c911e38d56a91f exploit

gist.github.com/sgInnora/107f2eb20367e47d58c911e38d56a91f

cve.org (CVE-2026-42483)

nvd.nist.gov (CVE-2026-42483)

Download JSON