krb5 is vulnerable to denial of service. A NULL pointer dereference in the check_1_6_dummy
function in lib/kadm5/srv/svr_principal.c
allows remote authenticated administrators with create
privilege to crash the process.
krbdev.mit.edu/rt/Ticket/Display.html?user=guest&pass=guest&id=7152
mailman.mit.edu/pipermail/kerberos-announce/2012q2/000136.html
rhn.redhat.com/errata/RHSA-2012-1131.html
web.mit.edu/kerberos/advisories/MITKRB5-SA-2012-001.txt
web.mit.edu/kerberos/krb5-1.10/
www.mandriva.com/security/advisories?name=MDVSA-2012:102
www.securityfocus.com/bid/53784
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=827517
github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
hermes.opensuse.org/messages/15083635
rhn.redhat.com/errata/RHSA-2012-1131.html