> -----BEGIN PGP SIGNED MESSAGE----- > MIT krb5 Security Advisory 2004-001 > 2004-06-01 > Topic: buffer overflows in krb5_aname_to_localname > > Only configurations which enable the explicit mapping or rules-based > mapping functionality of krb5_aname_to_localname() are vulnerable. > These configurations are not the default.
Ok, how do we know if we have enabled either of these? Is it a krb5.conf setting or ...? Thanks, John ________________________________________________ Kerberos mailing list [EMAIL PROTECTED] https://mailman.mit.edu/mailman/listinfo/kerberos
