-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
==========================================================
Secunia Research reported a vulnerability that allows for
the execution of arbitrary code in nmbd. This defect is
only be exploited when the "domain logons" parameter has
been enabled in smb.conf.
A patch addressing this defect has been posted to
http://www.samba.org/samba/security/
Additionally, Samba 3.0.28 has been issued as a security
release to correct the defect.
Samba administrators may avoid this security issue by disabling
both the "domain logons" options in the server's smb.conf file.
Note that this will disable all domain controller features as
well.
This vulnerability was reported to Samba developers by
Alin Rad Pop, Secunia Research.
The time line is as follows:
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFHXUQvIR7qMdg1EfYRArG0AJ9hSIu3s0AMtbgeaGDMTbSOXtA6ywCfSypz
T9GCNlOUVnZ2O25IOXQOzLk=
=cISn
-----END PGP SIGNATURE-----