MIT krb5 Security Advisory 2010-006 – When the MIT krb5 KDC receives certain Kerberos TGS request messages, it may dereference an uninitialized pointer while processing authorization data, causing a crash, or in rare cases, unauthorized information disclosure, ticket modification, or execution of arbitrary code. The crash may be triggered by legitimate requests. This is an implementation vulnerability in MIT krb5, and not a vulnerability in the Kerberos protocol.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/94518/MITKRB5-SA-2010-006.txt
Source: https://packetstormsecurity.com/files/94518/MIT-krb5-Security-Advisory-2010-006.html

