Source: hashcat
X-Debbugs-CC: [email protected]
Severity: normal
Tags: security

Hi,

The following vulnerabilities were published for hashcat.

CVE-2026-42482[0]:
| A stack-based buffer overflow in mangle_to_hex_lower() and
| mangle_to_hex_upper() in src/rp_cpu.c in hashcat v7.1.2 allows an
| attacker to cause a denial of service or possibly execute arbitrary
| code via a crafted rule file, or via the -j or -k rule options used
| with password candidates of 128 or more characters. The
| vulnerability is caused by a bounds check that fails to account for
| the 2x expansion that occurs when password bytes are converted to
| hexadecimal.

CVE-2026-42483[1]:
| A heap-based buffer overflow in the Kerberos hash parser in hashcat
| v7.1.2 allows an attacker to cause a denial of service or possibly
| execute arbitrary code via a crafted Kerberos hash file. The issue
| affects module_hash_decode in multiple Kerberos-related modules
| because account_info_len is calculated from untrusted delimiter
| positions without upper-bound validation before memcpy copies the
| data into a fixed-size account_info buffer.

CVE-2026-42484[2]:
| A heap-based buffer overflow in hex_to_binary in the PKZIP hash
| parser in hashcat v7.1.2 allows an attacker to cause a denial of
| service or possibly execute arbitrary code via a crafted PKZIP hash
| file. The issue affects modules 17200, 17210, 17220, 17225, and
| 17230. When data_type_enum<=1, attacker-controlled hex data from a
| user-supplied hash string is decoded into a fixed-size buffer
| without proper input-length validation.

It's unclear whether this has been properly reported upstream:
https://gist.github.com/sgInnora/107f2eb20367e47d58c911e38d56a91f



If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-42482
    https://www.cve.org/CVERecord?id=CVE-2026-42482
[1] https://security-tracker.debian.org/tracker/CVE-2026-42483
    https://www.cve.org/CVERecord?id=CVE-2026-42483
[2] https://security-tracker.debian.org/tracker/CVE-2026-42484
    https://www.cve.org/CVERecord?id=CVE-2026-42484

Please adjust the affected versions in the BTS as needed.

Reply via email to