The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.
https://exchange.xforce.ibmcloud.com/vulnerabilities/15508
http://www.mandriva.com/security/advisories?name=MDKSA-2004:023
http://www.kb.cert.org/vuls/id/484726
http://security.gentoo.org/glsa/glsa-200403-03.xml
http://marc.info/?l=bugtraq&m=108403806509920&w=2
http://marc.info/?l=bugtraq&m=107953412903636&w=2
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html