CVE-2009-0844Improper Restriction of Operations within the Bounds of a Memory Buffer in Kerberos

Severity
5.8MEDIUMNVD
EPSS
3.4%
top 12.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 9
Latest updateMay 2

Description

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

CVSS vector

AV:N/AC:M/C:P/I:N/A:PExploitability: 8.6 | Impact: 4.9

Affected Packages3 packages

Debianmit/krb5< 1.6.dfsg.4~beta1-13+3
NVDmit/kerberos5-1.6.3
NVDmit/kerberos_57 versions+6

🔴Vulnerability Details

3
GHSA
GHSA-4h8p-gqwx-mmw3: The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 12022-05-02
OSV
CVE-2009-0844: The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 12009-04-09
CVEList
CVE-2009-0844: The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 12009-04-09

📋Vendor Advisories

3
Ubuntu
Kerberos vulnerabilities2009-04-07
Red Hat
krb5: buffer over-read in SPNEGO GSS-API mechanism (MITKRB5-SA-2009-001)2009-04-07
Debian
CVE-2009-0844: krb5 - The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka...2009

💬Community

1
Bugzilla
CVE-2009-0844 krb5: buffer over-read in SPNEGO GSS-API mechanism (MITKRB5-SA-2009-001)2009-03-19
CVE-2009-0844 — MIT Kerberos vulnerability | cvebase