Secunia reported a buffer overflow flaw in Samba's reply_netbios_packet() function.
According to Secunia:
This can be exploited to cause a stack-based buffer
overflow by sending multiple specially crafted WINS "Name Registration"
requests followed by a WINS "Name Query" request.
Red Hat would like to thank Alin Rad Pop of Secunia Research for responsibly disclosing this issue.
Created attachment 243791 [details]
Now public at
This issue was addressed in:
Red Hat Enterprise Linux:
updated to fixed upstream version