Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.833891
Category:SuSE Local Security Checks
Title:openSUSE: Security Advisory for gssntlmssp (openSUSE-SU-2023:0048-1)
Summary:The remote host is missing an update for the 'gssntlmssp'; package(s) announced via the openSUSE-SU-2023:0048-1 advisory.
Description:Summary:
The remote host is missing an update for the 'gssntlmssp'
package(s) announced via the openSUSE-SU-2023:0048-1 advisory.

Vulnerability Insight:
This update for gssntlmssp fixes the following issues:

Update to version 1.2.0

* Implement gss_set_cred_option.

* Allow to gss_wrap even if NEGOTIATE_SEAL is not negotiated.

* Move HMAC code to OpenSSL EVP API.

* Fix crash bug when acceptor credentials are NULL.

* Translations update from Fedora Weblate.

Fix security issues:

* CVE-2023-25563 (boo#1208278): multiple out-of-bounds read when decoding
NTLM fields.

* CVE-2023-25564 (boo#1208279): memory corruption when decoding UTF16
strings.

* CVE-2023-25565 (boo#1208280): incorrect free when decoding target
information.

* CVE-2023-25566 (boo#1208281): memory leak when parsing usernames.

* CVE-2023-25567 (boo#1208282): out-of-bounds read when decoding target
information.

Update to version 1.1

* various build fixes and better compatibility when a MIC is requested.

Update to version 1.0

* Fix test_gssapi_rfc5587.

* Actually run tests with make check.

* Add two tests around NTLMSSP_NEGOTIATE_LMKEY.

* Refine LM compatibility level logic.

* Refactor the gssntlm_required_security function.

* Implement reading LM/NT hashes.

* Add test for smpasswd-like user files.

* Return confidentiality status.

* Fix segfault in sign/seal functions.

* Fix dummy signature generation.

* Use UCS16LE instead of UCS-2LE.

* Provide a zero lm key if the password is too long.

* Completely omit CBs AV pairs when no CB provided.

* Change license to the more permissive ISC.

* Do not require cached users with winbind.

* Add ability to pass keyfile via cred store.

* Remove unused parts of Makefile.am.

* Move attribute names to allocated strings.

* Adjust serialization for name attributes.

* Fix crash in acquiring credentials.

* Fix fallback to external_creds interface.

* Introduce parse_user_name() function.

* Add test for parse_user_name.

* Change how we assemble user names in ASC.

* Use thread local storage for winbind context.

* Make per thread winbind context optional.

* Fixed memleak of usr_cred.

* Support get_sids request via name attributes.

* Fixed memory leaks found by valgrind.

- Update to version 0.9

* add support for getting session key.

* Add gss_inquire_attrs_for_mech().

* Return actual data for RFC5587 API.

* Add new Windows version flags.

* Add Key exchange also when wanting integrity only.

* Drop support for GSS_C_MA_NOT_DFLT_MECH.

Affected Software/OS:
'gssntlmssp' package(s) on openSUSE Backports SLE-15-SP4.

Solution:
Please install the updated package(s).

CVSS Score:
8.5

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2023-25563
https://github.com/gssapi/gss-ntlmssp/commit/97c62c6167299028d80765080e74d91dfc99efbd
https://github.com/gssapi/gss-ntlmssp/releases/tag/v1.2.0
https://github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-jjjx-5qf7-9mgf
Common Vulnerability Exposure (CVE) ID: CVE-2023-25564
https://github.com/gssapi/gss-ntlmssp/commit/c753000eb31835c0664e528fbc99378ae0cbe950
https://github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-r85x-q5px-9xfq
Common Vulnerability Exposure (CVE) ID: CVE-2023-25565
https://github.com/gssapi/gss-ntlmssp/commit/c16100f60907a2de92bcb676f303b81facee0f64
https://github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-7q7f-wqcg-mvfg
Common Vulnerability Exposure (CVE) ID: CVE-2023-25566
https://github.com/gssapi/gss-ntlmssp/commit/8660fb16474054e692a596e9c79670cd4d3954f4
https://github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-mfm4-6g58-jw74
Common Vulnerability Exposure (CVE) ID: CVE-2023-25567
https://github.com/gssapi/gss-ntlmssp/commit/025fbb756d44ffee8f847db4222ed6aa4bd1fbe4
https://github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-24pf-6prf-24ch
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.