Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion.
https://exchange.xforce.ibmcloud.com/vulnerabilities/73361
https://bugzilla.redhat.com/show_bug.cgi?id=795509
http://www.ubuntu.com/usn/USN-1374-1
http://support.apple.com/kb/HT5281
http://secunia.com/advisories/48879
http://secunia.com/advisories/48844
http://secunia.com/advisories/48186
http://secunia.com/advisories/48116
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00008.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://btsc.webapps.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB29565