MIT krb5 Security Advisory 2010-004 – An authenticated remote attacker can crash the KDC by inducing the KDC to perform a double free. Under some circumstances on some platforms, this could also allow malicious code execution. Successfully inducing code execution by exploiting a double free is believed to be difficult, and no such exploits are known to exist for this vulnerability.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/88729/MITKRB5-SA-2010-004.txt
Source: https://packetstormsecurity.com/files/88729/KDC-Double-Free-Vulnerability.html

