Multiple checksum handling vulnerabilities exist in Kerberos. These vulnerabilities are in the MIT implementation of Kerberos (krb5), but because these vulnerabilities arise from flaws in protocol handling logic, other implementations may also be vulnerable.
df6ccc1619d5bc92b3ec89421e803287d181c7ce6fa6677e04ea80150ebc84bb