CVE-2009-4212

Severity

99%

Complexity

99%

Confidentiality

165%

Per: http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-004.txt FIXES ===== * The upcoming krb5-1.7.1 and krb5-1.6.4 releases will contain a fix for this vulnerability. * For the krb5-1.7 release, apply the patch available at: http://web.mit.edu/kerberos/advisories/2009-004-patch_1.7.txt A PGP-signed patch is available at http://web.mit.edu/kerberos/advisories/2009-004-patch_1.7.txt.asc * For the krb5-1.6 releases, apply the patch available at: http://web.mit.edu/kerberos/advisories/2009-004-patch_1.6.3.txt A PGP-signed patch is available at http://web.mit.edu/kerberos/advisories/2009-004-patch_1.6.3.txt.asc * The krb5-1.6.3 patch might apply successfully to older releases.

Multiple integer underflows in the (1) AES and (2) RC4 decryption functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3 through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by providing ciphertext with a length that is too short to be valid.

Per: http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-004.txt "Only releases krb5-1.3 and later are vulnerable, as earlier releases did not contain the functionality implemented by the vulnerable code. This is an implementation vulnerability in MIT krb5, and is not a vulnerability in the Kerberos protocol."

Per: http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-004.txt FIXES ===== * The upcoming krb5-1.7.1 and krb5-1.6.4 releases will contain a fix for this vulnerability. * For the krb5-1.7 release, apply the patch available at: http://web.mit.edu/kerberos/advisories/2009-004-patch_1.7.txt A PGP-signed patch is available at http://web.mit.edu/kerberos/advisories/2009-004-patch_1.7.txt.asc * For the krb5-1.6 releases, apply the patch available at: http://web.mit.edu/kerberos/advisories/2009-004-patch_1.6.3.txt A PGP-signed patch is available at http://web.mit.edu/kerberos/advisories/2009-004-patch_1.6.3.txt.asc * The krb5-1.6.3 patch might apply successfully to older releases.

CVSS 2.0 Base Score 9.9. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).

Overview

Type

Mit Kerberos 5

First reported 15 years ago

2010-01-13 19:30:00

Last updated 5 years ago

2020-01-21 15:45:00

Affected Software

Mit Kerberos 5 1.3

1.3

Mit Kerberos 5 1.3.1

1.3.1

Mit Kerberos 5 1.3.2

1.3.2

Mit Kerberos 5 1.3.3

1.3.3

Mit Kerberos 5 1.3.4

1.3.4

Mit Kerberos 5 1.3.5

1.3.5

Mit Kerberos 5 1.3.6

1.3.6

Mit Kerberos 5 1.4

1.4

Mit Kerberos 5 1.4.1

1.4.1

Mit Kerberos 5 1.4.2

1.4.2

Mit Kerberos 5 1.4.3

1.4.3

Mit Kerberos 5 1.4.4

1.4.4

Mit Kerberos 5 1.5

1.5

Mit Kerberos 5 1.5.1

1.5.1

Mit Kerberos 5 1.5.2

1.5.2

Mit Kerberos 5 1.5.3

1.5.3

Mit Kerberos 5 1.6

1.6

Mit Kerberos 5 1.6.1

1.6.1

Mit Kerberos 5 1.6.2

1.6.2

Mit Kerberos 5 1.7

1.7

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.