CVE-2026-25506
HIGHmunge 0.5-0.5.17 - Buffer Overflow via Oversized Address Length Field
Title source: llmDescription
MUNGE is an authentication service for creating and validating user credentials. From 0.5 to 0.5.17, local attacker can exploit a buffer overflow vulnerability in munged (the MUNGE authentication daemon) to leak cryptographic key material from process memory. With the leaked key material, the attacker could forge arbitrary MUNGE credentials to impersonate any user (including root) to services that rely on MUNGE for authentication. The vulnerability allows a buffer overflow by sending a crafted message with an oversized address length field, corrupting munged's internal state and enabling extraction of the MAC subkey used for credential verification. This vulnerability is fixed in 0.5.18.
References (6)
Core 6
Core References
Vendor Advisory x_refsource_confirm
https://github.com/dun/munge/security/advisories/GHSA-r9cr-jf4v-75gh
Patch x_refsource_misc
https://github.com/dun/munge/commit/bf40cc27c4ce8451d4b062c9de0b67ec40894812
Release Notes x_refsource_misc
https://github.com/dun/munge/releases/tag/munge-0.5.18
Scores
CVSS v3
7.7
EPSS
0.0003
EPSS Percentile
8.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-787
Status
published
Products (2)
debian/debian_linux
11.0
opensuse/munge
0.5 - 0.5.18
Published
Feb 10, 2026
Tracked Since
Feb 18, 2026