The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.
2009-04-09T00:30:00.250
2025-04-09T00:30:58.490
Deferred
CVSSv2: 5.8 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:N/A:P
8.6
4.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | mit | kerberos | 5-1.6.3 | Yes |
Application | mit | kerberos_5 | - | Yes |
Application | mit | kerberos_5 | 1.5 | Yes |
Application | mit | kerberos_5 | 1.5.1 | Yes |
Application | mit | kerberos_5 | 1.5.2 | Yes |
Application | mit | kerberos_5 | 1.5.3 | Yes |
Application | mit | kerberos_5 | 1.6 | Yes |
Application | mit | kerberos_5 | 1.6.1 | Yes |
Application | mit | kerberos_5 | 1.6.2 | Yes |