{"id":"CVE-2022-3116","details":"The Heimdal Software Kerberos 5 implementation is vulnerable to a null pointer dereferance. An attacker with network access to an application that depends on the vulnerable code path can cause the application to crash.","modified":"2026-03-14T11:46:21.611480Z","published":"2023-03-27T22:15:11.987Z","related":["MGASA-2022-0395"],"references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230505-0010/"},{"type":"ADVISORY","url":"https://www.kb.cert.org/vuls/id/730793"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/heimdal/heimdal","events":[{"introduced":"0"},{"last_affected":"e1959605bd490e1eb9ea5e2277f4a332208097de"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"7.7.0"}]}}],"versions":["git2svn-syncpoint-master","heimdal-1.3.0pre1","heimdal-1.3.0pre10","heimdal-1.3.0pre11","heimdal-1.3.0pre3","heimdal-1.3.0pre4","heimdal-1.3.0pre5","heimdal-1.3.0pre6","heimdal-1.3.0pre7","heimdal-1.3.0pre8","heimdal-1.3.0pre9","heimdal-1.3.0rc1","heimdal-1.5pre1","heimdal-1.5pre2","heimdal-7.0.1","heimdal-7.0.2","heimdal-7.0.3","heimdal-7.1.0","heimdal-7.1rc1","heimdal-7.2.0","heimdal-7.3.0","heimdal-7.4.0","heimdal-7.5.0","heimdal-7.6.0","heimdal-7.7.0","switch-from-svn-to-git","upstream-1.4.0+git20101228.dfsg.1","upstream-1.4.0+git20110220.dfsg.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-3116.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}