MIT krb5 Security Advisory 2007-006 – The MIT krb5 Kerberos administration daemon (kadmind) is vulnerable to a stack buffer overflow in the RPCSEC_GSS authentication flavor of the RPC library. Third-party applications using the RPC library provided with MIT krb5 may also be affected.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/59078/MITKRB5-SA-2007-006.txt
Source: https://packetstormsecurity.com/files/59078/MITKRB5-SA-2007-006.txt.html

