info
discussion
exploit
solution
references
KTH Kerberos 4 Arbitrary Proxy Usage Vulnerability
References:
KTH Kerberos Homepage
(Swedish Royal Institute of Technology)
Privacy Statement
Copyright 2010, SecurityFocus