The add_to_history function in svr_principal.c in libkadm5srv for MIT Kerberos 5 (krb5) up to 1.3.5, when performing a password change, does not properly track the password policy's history count and the maximum number of keys, which can cause an array index out-of-bounds error and may allow authenticated users to execute arbitrary code via a heap-based buffer overflow.
https://exchange.xforce.ibmcloud.com/vulnerabilities/18621
http://www.redhat.com/support/errata/RHSA-2005-045.html
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.mandriva.com/security/advisories?name=MDKSA-2004:156
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-004-pwhist.txt
http://marc.info/?l=bugtraq&m=110548298407590&w=2
http://marc.info/?l=bugtraq&m=110358420909358&w=2
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html