The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10344
http://www.trustix.net/errata/2004/0046/
http://www.redhat.com/support/errata/RHSA-2004-467.html
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:092
http://www.idefense.com/application/poi/display?id=138&type=vulnerabilities
http://www.gentoo.org/security/en/glsa/glsa-200409-16.xml
http://marc.info/?l=bugtraq&m=109526231623307&w=2
http://marc.info/?l=bugtraq&m=109509335230495&w=2
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000873