Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-0844

Опубликовано: 07 апр. 2009
Источник: redhat
CVSS2: 5.8

Описание

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=491033krb5: buffer over-read in SPNEGO GSS-API mechanism (MITKRB5-SA-2009-001)

5.8 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 16 лет назад

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

nvd
больше 16 лет назад

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

debian
больше 16 лет назад

The get_input_token function in the SPNEGO implementation in MIT Kerbe ...

github
больше 3 лет назад

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

oracle-oval
больше 16 лет назад

ELSA-2009-0408: krb5 security update (IMPORTANT)

5.8 Medium

CVSS2