Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-0844

Опубликовано: 09 апр. 2009
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5.8

Описание

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

РелизСтатусПримечание
dapper

not-affected

devel

released

1.6.dfsg.4~beta1-5ubuntu2
gutsy

released

1.6.dfsg.1-7ubuntu0.2
hardy

released

1.6.dfsg.3~beta1-2ubuntu1.1
intrepid

released

1.6.dfsg.4~beta1-3ubuntu0.1
upstream

released

Показывать по

EPSS

Процентиль: 92%
0.0797
Низкий

5.8 Medium

CVSS2

Связанные уязвимости

redhat
около 16 лет назад

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

nvd
около 16 лет назад

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

debian
около 16 лет назад

The get_input_token function in the SPNEGO implementation in MIT Kerbe ...

github
около 3 лет назад

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

oracle-oval
около 16 лет назад

ELSA-2009-0408: krb5 security update (IMPORTANT)

EPSS

Процентиль: 92%
0.0797
Низкий

5.8 Medium

CVSS2