samba is vulnerable to arbitrary code execution. A missing array boundary checking flaw was found in the way Samba parsed the binary representation of Windows security identifiers (SIDs). A malicious client could send a specially-crafted SMB request to the Samba server, resulting in arbitrary code execution with the privileges of the Samba server (smbd).
lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
lists.fedoraproject.org/pipermail/package-announce/2010-September/047650.html
lists.fedoraproject.org/pipermail/package-announce/2010-September/047697.html
lists.fedoraproject.org/pipermail/package-announce/2010-September/047758.html
lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html
lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
marc.info/?l=bugtraq&m=130835366526620&w=2
secunia.com/advisories/41354
secunia.com/advisories/41447
secunia.com/advisories/42531
secunia.com/advisories/42885
support.apple.com/kb/HT4581
support.apple.com/kb/HT4723
us1.samba.org/samba/history/samba-3.5.5.html
us1.samba.org/samba/security/CVE-2010-3069.html
www.redhat.com/security/updates/classification/#critical
www.redhat.com/support/errata/RHSA-2010-0860.html
www.securityfocus.com/archive/1/515055/100/0/threaded
www.securityfocus.com/bid/43212
www.securitytracker.com/id?1024434
www.ubuntu.com/usn/USN-987-1
www.vmware.com/security/advisories/VMSA-2010-0019.html
www.vupen.com/english/advisories/2010/2378
www.vupen.com/english/advisories/2010/3126
www.vupen.com/english/advisories/2011/0091
access.redhat.com/errata/RHSA-2010:0697
access.redhat.com/errata/RHSA-2010:0698
access.redhat.com/errata/RHSA-2010:0860
access.redhat.com/security/cve/CVE-2010-3069
bugzilla.redhat.com/show_bug.cgi?id=630869
exchange.xforce.ibmcloud.com/vulnerabilities/61773