CVE-2009-4212

N/A Unknown
Published: January 13, 2010 Modified: April 23, 2026
View on NVD

Description

Multiple integer underflows in the (1) AES and (2) RC4 decryption functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3 through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by providing ciphertext with a length that is too short to be valid.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://ubuntu.com/usn/usn-881-1
Source: cve@mitre.org
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-004.txt
Source: cve@mitre.org
Patch Vendor Advisory
http://marc.info/?l=bugtraq&m=130497213107107&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38080
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38108
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38126
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38140
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38184
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38203
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38696
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/40220
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-66-275530-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.apple.com/kb/HT4188
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.avaya.com/css/P8/documents/100074869
Source: af854a3a-2127-422b-91ae-364da2661108
http://ubuntu.com/usn/usn-881-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-004.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.debian.org/security/2010/dsa-1969
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2010:006
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/37749
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1023440
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2010/0096
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2010/0129
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2010/1481
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=545015
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
https://rhn.redhat.com/errata/RHSA-2010-0029.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2010-0095.html
Source: af854a3a-2127-422b-91ae-364da2661108

62 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
16.5%
95th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

mit