The RPC library in Kerberos 5 1.4 through 1.4.4, and 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, calls an uninitialized function pointer in freed memory, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
https://exchange.xforce.ibmcloud.com/vulnerabilities/31422
http://www.ubuntu.com/usn/usn-408-1
http://www.mandriva.com/security/advisories?name=MDKSA-2007:008
http://www.kb.cert.org/vuls/id/481564
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-002-rpc.txt
http://security.gentoo.org/glsa/glsa-200701-21.xml
http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html