WRQ Information for VU#686862
MIT Kerberos 5 krb5_aname_to_localname() contains several heap overflows
- Vendor Information Help Date Notified: 02 Jun 2004
- Statement Date:
- Date Updated: 03 Jun 2004
The WRQ Reflection Kerberos Client is not subject to the krb5_aname_to_localname() vulnerabilities [VU#686862], because it contains client functionality only and does no mapping of principal name to username.
WRQ recommends that users periodically check WRQ's "Security Updates and Reflection" Technical Note (http://support.wrq.com/techdocs/1708.html) for information on advisories or updates.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.