From upstream samba advisory: Samba versions 3.4.0 and above allow the administrator to implement locking out Samba accounts after a number of bad password attempts. However, all released versions of Samba did not implement this check for password changes, such as are available over multiple SAMR and RAP interfaces, allowing password guessing attacks. Most sites do not configure the bad password lockout feature. Typically it is only enabled when Samba is configured as a Domain Controller, so most file server deployments are not impacted. This flaw only affects samba when deployed as a Primary Domain Controller. Upstream bug: https://bugzilla.samba.org/show_bug.cgi?id=10245
Public via: http://www.samba.org/samba/security/CVE-2013-4496
Created samba tracking bugs for this issue: Affects: fedora-all [bug 1075429]
samba-4.1.6-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
Acknowledgements: Red Hat would like to thank the Samba project for reporting this issue. Upstream acknowledges Andrew Bartlett as the original reporter.
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Via RHSA-2014:0330 https://rhn.redhat.com/errata/RHSA-2014-0330.html
samba-4.0.16-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2014:0383 https://rhn.redhat.com/errata/RHSA-2014-0383.html