Kerberos5 KDC Cross Realm Referral Denial of Service Vulnerability

Summary
This host is installed with Kerberos5 and is prone to Denial of Service vulnerability.
Impact
Successful exploitation will allow attacker to cause a denial of service. Impact level: Application
Solution
Upgrade kerberos5 version 1.7.1 or Apply patch from below link, http://web.mit.edu/kerberos/www/ http://web.mit.edu/kerberos/advisories/2009-003-patch.txt ***** NOTE: Ignore this warning if above mentioned patch is already applied. *****
Insight
The flaw is caused by a NULL pointer dereference error in the KDC cross-realm referral processing implementation, which could allow an unauthenticated remote attacker to cause KDC to crash.
Affected
kerberos5 version prior to 1.7.1
References