// For flags

CVE-2009-0847

 

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The asn1buf_imbed function in the ASN.1 decoder in MIT Kerberos 5 (aka krb5) 1.6.3, when PK-INIT is used, allows remote attackers to cause a denial of service (application crash) via a crafted length value that triggers an erroneous malloc call, related to incorrect calculations with pointer arithmetic.

La función asnbuf_imbed en el decodificador ASN.1 en MIT Kerberos 5 (también conocido como krb5) v1.6.3 cuando se usa PK-INIT, permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) a través de un valor length modificado que provoca una llamada malloc errónea, relativo a cálculo erróneos con punto aritmético.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2009-03-06 CVE Reserved
  • 2009-04-09 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-189: Numeric Errors
CAPEC
References (38)
URL Tag Source
http://secunia.com/advisories/34594 Third Party Advisory
http://secunia.com/advisories/34617 Third Party Advisory
http://secunia.com/advisories/34622 Third Party Advisory
http://secunia.com/advisories/34628 Third Party Advisory
http://secunia.com/advisories/34637 Third Party Advisory
http://secunia.com/advisories/34640 Third Party Advisory
http://secunia.com/advisories/34734 Third Party Advisory
http://secunia.com/advisories/35074 Third Party Advisory
http://support.apple.com/kb/HT3549 X_refsource_confirm
http://support.avaya.com/elmodocs2/security/ASA-2009-142.htm X_refsource_confirm
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047180.html X_refsource_misc
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047181.html X_refsource_misc
http://wiki.rpath.com/Advisories:rPSA-2009-0058 X_refsource_confirm
http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0058 X_refsource_misc
http://www-01.ibm.com/support/docview.wss?uid=swg21396120 X_refsource_confirm
http://www.kb.cert.org/vuls/id/662091 Third Party Advisory
http://www.securityfocus.com/archive/1/502526/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/502546/100/0/threaded Mailing List
http://www.securityfocus.com/bid/34408 Vdb Entry
http://www.securitytracker.com/id?1021993 Vdb Entry
http://www.us-cert.gov/cas/techalerts/TA09-133A.html Third Party Advisory
http://www.vupen.com/english/advisories/2009/0960 Vdb Entry
http://www.vupen.com/english/advisories/2009/0976 Vdb Entry
http://www.vupen.com/english/advisories/2009/1057 Vdb Entry
http://www.vupen.com/english/advisories/2009/1106 Vdb Entry
http://www.vupen.com/english/advisories/2009/1297 Vdb Entry
http://www.vupen.com/english/advisories/2009/2084 Vdb Entry
http://www.vupen.com/english/advisories/2009/2248 Vdb Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6387 Signature
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mit
Search vendor "Mit"
Kerberos
Search vendor "Mit" for product "Kerberos"
5-1.6.3
Search vendor "Mit" for product "Kerberos" and version "5-1.6.3"
-
Affected