MIT Kerberos 5 kpasswd UDP Packet Denial Of Service Vulnerability

Summary
This host is running MIT Kerberos and is prone to denial of service vulnerability.
Impact
Successful exploitation will allow attacker to cause a denial of service via a forged packet that triggers a communication loop. Impact Level: Application
Solution
Upgrade to MIT Kerberos 5 version 1.11.3 or later, For updates refer to http://web.mit.edu/kerberos
Insight
The flaw is caused due to the kpasswd application does not properly validate UDP packets before sending responses and can be exploited to exhaust CPU and network resources via the UDP 'ping-pong' attack.
Affected
MIT Kerberos 5 before 1.11.3
References