The kadm5_modify_policy_internal function in lib/kadm5/srv/svr_policy.c in the Kerberos administration daemon (kadmind) in MIT Kerberos 5 (krb5) 1.5 through 1.6.2 does not properly check return values when the policy does not exist, which might allow remote authenticated users with the "modify policy" privilege to execute arbitrary code via unspecified vectors that trigger a write to an uninitialized pointer.
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00087.html
https://bugzilla.redhat.com/show_bug.cgi?id=250976
http://www.securityfocus.com/archive/1/478794/100/0/threaded
http://www.redhat.com/support/errata/RHSA-2007-0858.html
http://www.kb.cert.org/vuls/id/377544
http://www.gentoo.org/security/en/glsa/glsa-200709-01.xml
http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2007-006.txt