CVE-2026-42483

Hashcat · Hashcat

A heap-based buffer overflow in the Kerberos hash parser of Hashcat v7.1.2 allows for potential arbitrary code execution via a crafted hash file.

Executive summary

A critical heap-based buffer overflow in Hashcat's Kerberos hash parser enables potential arbitrary code execution when processing malicious hash input.

Vulnerability

The vulnerability exists in the module_hash_decode function within Kerberos-related modules. It arises from a lack of upper-bound validation on the account_info_len parameter, leading to a heap-based buffer overflow when data is copied into a fixed-size buffer.

Business impact

With a CVSS score of 9.8, this vulnerability carries significant risk for security teams using Hashcat for password auditing. An attacker providing a malicious Kerberos hash file could trigger a crash (DoS) or gain unauthorized code execution, compromising the security of the analysis environment.

Remediation

Immediate Action: Update Hashcat to the latest version, which includes the required input validation for hash parsing.

Proactive Monitoring: Review security logs for anomalous behavior in the Hashcat process, particularly when loading Kerberos-formatted hash files.

Compensating Controls: Use strict file input controls to ensure that only trusted, validated hash files are processed by the application.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Users of Hashcat must apply the vendor-supplied update immediately. By ensuring the software is updated, administrators can mitigate the risk of memory corruption vulnerabilities that could be leveraged for system exploitation.