Samba versions 3.3.12 and all versions previous to this are affected
by a memory corruption vulnerability. Samba versions 3.4.0 and all
releases since this version are *NOT* affected by this problem. In
particular, the current stable Samba version 3.5.3 is *NOT* affected
by this problem.
Code dealing with the chaining of SMB1 packets did not correctly
validate an input field provided by the client, making it possible
for a specially crafted packet to crash the server or potentially
cause the server to execute arbitrary code.
This does not require an authenticated connection and so is the
most dangerous kind of vulnerability. All affected systems should
be patched as soon as possible.
Vendor Status:
Samba had issued an update for this vulnerability.
Patch Availability:
A patch addressing this defect has been posted to