WRQ Information for VU#686862

MIT Kerberos 5 krb5_aname_to_localname() contains several heap overflows

Status

Not Affected

Vendor Statement

The WRQ Reflection Kerberos Client is not subject to the krb5_aname_to_localname() vulnerabilities [VU#686862], because it contains client functionality only and does no mapping of principal name to username.

WRQ recommends that users periodically check WRQ's "Security Updates and Reflection" Technical Note (http://support.wrq.com/techdocs/1708.html) for information on advisories or updates.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References

None

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.