Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-0844

Опубликовано: 09 апр. 2009
Источник: debian
EPSS Низкий

Описание

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
krb5fixed1.6.dfsg.4~beta1-13package
krb5not-affectedetchpackage

EPSS

Процентиль: 92%
0.0797
Низкий

Связанные уязвимости

ubuntu
около 16 лет назад

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

redhat
около 16 лет назад

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

nvd
около 16 лет назад

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

github
около 3 лет назад

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

oracle-oval
около 16 лет назад

ELSA-2009-0408: krb5 security update (IMPORTANT)

EPSS

Процентиль: 92%
0.0797
Низкий