CVE-2009-0844

NameCVE-2009-0844
DescriptionThe get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-1766-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
krb5 (PTS)bullseye (security), bullseye1.18.3-6+deb11u5fixed
bookworm, bookworm (security)1.20.1-2+deb12u2fixed
sid, trixie1.21.3-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
krb5sourceetch1.4.4-7etch7DSA-1766-1
krb5sourcelenny1.6.dfsg.4~beta1-5lenny1DSA-1766-1
krb5source(unstable)1.6.dfsg.4~beta1-13

Notes

[etch] - krb5 <not-affected> (Vulnerable code was introduced in 1.5)

Search for package or bug name: Reporting problems