Unrated severityNVD Advisory· Published Mar 27, 2009· Updated Apr 23, 2026
CVE-2009-0845
CVE-2009-0845
Description
The spnego_gss_accept_sec_context function in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3, when SPNEGO is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via invalid ContextFlags data in the reqFlags field in a negTokenInit token.
Affected products
8cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*+ 6 more
- cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
44- src.mit.edu/fisheye/browse/krb5/trunk/src/lib/gssapi/spnego/spnego_mech.cnvdExploit
- secunia.com/advisories/34347nvdVendor Advisory
- secunia.com/advisories/35074nvdVendor Advisory
- src.mit.edu/fisheye/changelog/krb5/nvdVendor Advisory
- www.vupen.com/english/advisories/2009/0847nvdVendor Advisory
- www.vupen.com/english/advisories/2009/2248nvdVendor Advisory
- www.kb.cert.org/vuls/id/662091nvdUS Government Resource
- www.us-cert.gov/cas/techalerts/TA09-133A.htmlnvdUS Government Resource
- krbdev.mit.edu/rt/Ticket/Display.htmlnvd
- lists.apple.com/archives/security-announce/2009/May/msg00002.htmlnvd
- secunia.com/advisories/34594nvd
- secunia.com/advisories/34617nvd
- secunia.com/advisories/34622nvd
- secunia.com/advisories/34628nvd
- secunia.com/advisories/34630nvd
- secunia.com/advisories/34637nvd
- secunia.com/advisories/34640nvd
- secunia.com/advisories/34734nvd
- security.gentoo.org/glsa/glsa-200904-09.xmlnvd
- sunsolve.sun.com/search/document.donvd
- support.apple.com/kb/HT3549nvd
- support.avaya.com/elmodocs2/security/ASA-2009-142.htmnvd
- support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047180.htmlnvd
- support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047181.htmlnvd
- web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-001.txtnvd
- wiki.rpath.com/Advisories:rPSA-2009-0058nvd
- wiki.rpath.com/wiki/Advisories:rPSA-2009-0058nvd
- www-01.ibm.com/support/docview.wssnvd
- www.mandriva.com/security/advisoriesnvd
- www.redhat.com/support/errata/RHSA-2009-0408.htmlnvd
- www.securityfocus.com/archive/1/502526/100/0/threadednvd
- www.securityfocus.com/archive/1/502546/100/0/threadednvd
- www.securityfocus.com/bid/34257nvd
- www.securitytracker.com/idnvd
- www.ubuntu.com/usn/usn-755-1nvd
- www.vupen.com/english/advisories/2009/0976nvd
- www.vupen.com/english/advisories/2009/1057nvd
- www.vupen.com/english/advisories/2009/1106nvd
- www.vupen.com/english/advisories/2009/1297nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/49448nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10044nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6449nvd
- www.redhat.com/archives/fedora-package-announce/2009-April/msg00205.htmlnvd
- www.redhat.com/archives/fedora-package-announce/2009-April/msg00206.htmlnvd
News mentions
0No linked articles in our index yet.