"A missing array boundary checking flaw was found in the way Samba parsed
the binary representation of Windows security identifiers (SIDs). A
malicious client could send a specially-crafted SMB request to the Samba
server, resulting in arbitrary code execution with the privileges of the
Samba server (smbd). (CVE-2010-3069)"
This bug affects Samba in general, although it is a RedHat announcement
above. New packages are available to fix this issue.
Due to the nature of this bug, it should be treated as a Priority 3,
Severity 3 issue. Please update as soon as possible to avoid exploitation.