MIT krb5 Security Advisory 2010-003 – In previous MIT krb5 releases krb5-1.5 through krb5-1.6.3, the Kerberos administration daemon (kadmind) can crash due to referencing freed memory. A legitimate user can trigger this crash by using a newer version of the kadmin protocol than the server supports.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/88166/MITKRB5-SA-2010-003.txt
Source: https://packetstormsecurity.com/files/88166/kadmind-Denial-Of-Service.html

