Unrated severityNVD Advisory· Published Apr 9, 2009· Updated Apr 23, 2026
CVE-2009-0844
CVE-2009-0844
Description
The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.
Affected products
9cpe:2.3:a:mit:kerberos_5:-:*:*:*:*:*:*:*+ 7 more
- cpe:2.3:a:mit:kerberos_5:-:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
39- www.kb.cert.org/vuls/id/662091nvdUS Government Resource
- www.us-cert.gov/cas/techalerts/TA09-133A.htmlnvdUS Government Resource
- lists.apple.com/archives/security-announce/2009/May/msg00002.htmlnvd
- secunia.com/advisories/34594nvd
- secunia.com/advisories/34617nvd
- secunia.com/advisories/34622nvd
- secunia.com/advisories/34628nvd
- secunia.com/advisories/34630nvd
- secunia.com/advisories/34637nvd
- secunia.com/advisories/34640nvd
- secunia.com/advisories/34734nvd
- secunia.com/advisories/35074nvd
- security.gentoo.org/glsa/glsa-200904-09.xmlnvd
- sunsolve.sun.com/search/document.donvd
- support.apple.com/kb/HT3549nvd
- support.avaya.com/elmodocs2/security/ASA-2009-142.htmnvd
- support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047180.htmlnvd
- support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047181.htmlnvd
- web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-001.txtnvd
- wiki.rpath.com/Advisories:rPSA-2009-0058nvd
- wiki.rpath.com/wiki/Advisories:rPSA-2009-0058nvd
- www-01.ibm.com/support/docview.wssnvd
- www.mandriva.com/security/advisoriesnvd
- www.redhat.com/support/errata/RHSA-2009-0408.htmlnvd
- www.securityfocus.com/archive/1/502526/100/0/threadednvd
- www.securityfocus.com/archive/1/502546/100/0/threadednvd
- www.securityfocus.com/bid/34408nvd
- www.securitytracker.com/idnvd
- www.ubuntu.com/usn/usn-755-1nvd
- www.vupen.com/english/advisories/2009/0960nvd
- www.vupen.com/english/advisories/2009/0976nvd
- www.vupen.com/english/advisories/2009/1057nvd
- www.vupen.com/english/advisories/2009/1106nvd
- www.vupen.com/english/advisories/2009/1297nvd
- www.vupen.com/english/advisories/2009/2248nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6339nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9474nvd
- www.redhat.com/archives/fedora-package-announce/2009-April/msg00205.htmlnvd
- www.redhat.com/archives/fedora-package-announce/2009-April/msg00206.htmlnvd
News mentions
0No linked articles in our index yet.