Mandriva Linux Security Advisory 2010-119 – Samba versions 3.0.x, 3.2.x and 3.3.x are affected by a memory corruption vulnerability. Code dealing with the chaining of SMB1 packets did not correctly validate an input field provided by the client, making it possible for a specially crafted packet to crash the server or potentially cause the server to execute arbitrary code. The updated packages have been patched to correct this issue.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/90767/MDVSA-2010-119.txt
Source: https://packetstormsecurity.com/files/90767/Mandriva-Linux-Security-Advisory-2010-119.html

