Secunia reported a buffer overflow flaw in Samba's reply_netbios_packet() function.
According to Secunia:
This can be exploited to cause a stack-based buffer
overflow by sending multiple specially crafted WINS "Name Registration"
requests followed by a WINS "Name Query" request.
Acknowledgements:
Red Hat would like to thank Alin Rad Pop of Secunia Research for responsibly disclosing this issue.