CVE-2026-2303
Heap Out-of-Bounds Read in mongo-go-driver GSSAPI C Wrapper
Publication date: 2026-02-10
Last updated on: 2026-02-10
Assigner: MongoDB, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mongodb | mongo-go-driver | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-183 | The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are explicitly allowed by policy because the inputs are assumed to be safe, but the list is too permissive - that is, it allows an input that is unsafe, leading to resultant weaknesses. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the mongo-go-driver repository, specifically in the CGo bindings for GSSAPI (Kerberos) authentication on Linux and macOS. The issue arises from a heap out-of-bounds read caused by incorrect assumptions about string termination in the GSSAPI standard. Since GSSAPI buffers are not guaranteed to be null-terminated or padded, the code reads one byte beyond the allocated heap buffer, leading to a potential memory safety issue.
How can this vulnerability impact me? :
The vulnerability can lead to an out-of-bounds read on the heap, which may cause information disclosure or memory corruption. According to the CVSS v3.1 score, it has a base score of 6.5 with a high impact on integrity but no impact on confidentiality or availability. This means an attacker with low privileges could potentially manipulate data integrity without user interaction, possibly affecting the reliability of the authentication process.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know