Several cryptographic vulnerabilities exist in the basic Kerberos Version 4 protocol that could allow an attacker to impersonate any user in a Kerberos realm.
vulners.com/securityvulns/securityvulns:doc:4221