Kerberos is vulnerable to denial of service (DoS). The attack is possible when malicious requests can be sent to the setup_server_realm()
function to cause a NULL pointer dereference, crashing the KDC.
advisories.mageia.org/MGASA-2013-0335.html
krbdev.mit.edu/rt/Ticket/Display.html?id=7757
lists.opensuse.org/opensuse-updates/2013-11/msg00082.html
lists.opensuse.org/opensuse-updates/2013-11/msg00086.html
lists.opensuse.org/opensuse-updates/2013-12/msg00026.html
web.mit.edu/kerberos/krb5-1.10/README-1.10.7.txt
web.mit.edu/kerberos/krb5-1.11/README-1.11.4.txt
www.securityfocus.com/bid/63555
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1026942
github.com/krb5/krb5/commit/c2ccf4197f697c4ff143b8a786acdd875e70a89d
lists.debian.org/debian-lts-announce/2018/01/msg00040.html
rhn.redhat.com/errata/RHSA-2014-1245.html