The gssrpc__svcauth_gssapi function in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a zero-length RPC credential, which causes kadmind to free an uninitialized pointer during cleanup.
https://exchange.xforce.ibmcloud.com/vulnerabilities/35082
http://www.ubuntu.com/usn/usn-477-1
http://www.mandriva.com/security/advisories?name=MDKSA-2007:137
http://www.kb.cert.org/vuls/id/356961
http://www.debian.org/security/2007/dsa-1323
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-004.txt
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-004.txt
http://security.gentoo.org/glsa/glsa-200707-11.xml
http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html