Remote exploitation of a buffer overflow vulnerability within Samba Project's Samba could allow an attacker to execute arbitrary code with root privileges.
This vulnerability exists in a certain function within Samba, where an attacker could trigger a memory corruption by sending specially crafted SMB requests resulting in heap memory overwritten with attacker supplied data, which can allow attackers to execute code remotely.
Patch Availability:
Samba has released patches to address this issue. Information about downloadable vendor updates can be found by clicking on the following URL: http://www.samba.org/samba/security/
Workaround:
Firewalls should be utilized to prevent unauthorized connections to samba ports.