Unrated severityNVD Advisory· Published Jan 13, 2010· Updated Apr 23, 2026
CVE-2009-4212
CVE-2009-4212
Description
Multiple integer underflows in the (1) AES and (2) RC4 decryption functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3 through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by providing ciphertext with a length that is too short to be valid.
Affected products
21cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*+ 19 more
- cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
31- web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-004.txtnvdPatchVendor Advisory
- bugzilla.redhat.com/show_bug.cginvdPatch
- lists.apple.com/archives/security-announce/2010//Jun/msg00001.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2010-January/033915.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2010-January/033919.htmlnvd
- marc.infonvd
- secunia.com/advisories/38080nvd
- secunia.com/advisories/38108nvd
- secunia.com/advisories/38126nvd
- secunia.com/advisories/38140nvd
- secunia.com/advisories/38184nvd
- secunia.com/advisories/38203nvd
- secunia.com/advisories/38696nvd
- secunia.com/advisories/40220nvd
- sunsolve.sun.com/search/document.donvd
- sunsolve.sun.com/search/document.donvd
- support.apple.com/kb/HT4188nvd
- support.avaya.com/css/P8/documents/100074869nvd
- ubuntu.com/usn/usn-881-1nvd
- www.debian.org/security/2010/dsa-1969nvd
- www.mandriva.com/security/advisoriesnvd
- www.securityfocus.com/bid/37749nvd
- www.securitytracker.com/idnvd
- www.vupen.com/english/advisories/2010/0096nvd
- www.vupen.com/english/advisories/2010/0129nvd
- www.vupen.com/english/advisories/2010/1481nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11272nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7357nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8192nvd
- rhn.redhat.com/errata/RHSA-2010-0029.htmlnvd
- rhn.redhat.com/errata/RHSA-2010-0095.htmlnvd
News mentions
0No linked articles in our index yet.