MUNGE is an authentication service for creating and validating user credentials. From 0.5 to 0.5.17, local attacker can exploit a buffer overflow vulnerability in munged (the MUNGE authentication daemon) to leak cryptographic key material from process memory. With the leaked key material, the attacker could forge arbitrary MUNGE credentials to impersonate any user (including root) to services that rely on MUNGE for authentication. The vulnerability allows a buffer overflow by sending a crafted message with an oversized address length field, corrupting munged's internal state and enabling extraction of the MAC subkey used for credential verification. This vulnerability is fixed in 0.5.18.

Project Subscriptions

Vendors Products
Advisories
Source ID Title
Debian DLA Debian DLA DLA-4477-1 munge security update
Debian DSA Debian DSA DSA-6129-1 munge security update
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 17 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
References

Thu, 12 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Tue, 10 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Dun
Dun munge
Vendors & Products Dun
Dun munge

Tue, 10 Feb 2026 21:30:00 +0000


Tue, 10 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Description MUNGE is an authentication service for creating and validating user credentials. From 0.5 to 0.5.17, local attacker can exploit a buffer overflow vulnerability in munged (the MUNGE authentication daemon) to leak cryptographic key material from process memory. With the leaked key material, the attacker could forge arbitrary MUNGE credentials to impersonate any user (including root) to services that rely on MUNGE for authentication. The vulnerability allows a buffer overflow by sending a crafted message with an oversized address length field, corrupting munged's internal state and enabling extraction of the MAC subkey used for credential verification. This vulnerability is fixed in 0.5.18.
Title MUNGE has a buffer overflow in message unpacking allows key leakage and credential forgery
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-17T18:17:47.022Z

Reserved: 2026-02-02T18:21:42.486Z

Link: CVE-2026-25506

cve-icon Vulnrichment

Updated: 2026-02-17T18:17:47.022Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-02-10T19:16:03.720

Modified: 2026-02-17T19:21:57.227

Link: CVE-2026-25506

cve-icon Redhat

Severity : Important

Publid Date: 2026-02-10T18:55:57Z

Links: CVE-2026-25506 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-02-10T21:33:21Z

Weaknesses