"Multiple Kerberos distributions contain a remotely exploitable buffer overflow in the Kerberos administration daemon. A remote attacker could exploit this vulnerability to gain root privileges on a vulnerable system."
Provides products for database security, web security, and security infrastructure based on the Kerberos protocol, and also provides Kerberos consulting and support.