Samba is vulnerable to arbitrary code execution. A heap-based buffer overflow flaw was found in Samba’s NetBIOS message block daemon (nmbd). An attacker on the local network could use this flaw to send specially crafted packets that, when processed by nmbd, could possibly lead to arbitrary code execution with root privileges.
lists.fedoraproject.org/pipermail/package-announce/2014-August/136280.html
lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
lists.opensuse.org/opensuse-updates/2014-08/msg00027.html
secunia.com/advisories/59583
secunia.com/advisories/59610
secunia.com/advisories/59976
www.samba.org/samba/security/CVE-2014-3560
www.securityfocus.com/bid/69021
www.securitytracker.com/id/1030663
www.ubuntu.com/usn/USN-2305-1
access.redhat.com/security/cve/CVE-2014-0178
access.redhat.com/security/cve/CVE-2014-0244
access.redhat.com/security/cve/CVE-2014-3493
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1126010
exchange.xforce.ibmcloud.com/vulnerabilities/95081
git.samba.org/?p=samba.git;a=commitdiff;h=e6a848630da3ba958c442438ea131c99fa088605
git.samba.org/?p=samba.git;a=commitdiff;h=fb1d325d96dfe9bc2e9c4ec46ad4c55e8f18f4a2
rhn.redhat.com/errata/RHSA-2014-1009.html
www.samba.org/samba/security/CVE-2014-3560