Debian Security Advisory DSA 701-2 (samba)

Summary
The remote host is missing an update to samba announced via advisory DSA 701-2.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20701-2
Insight
It has been discovered that the last security update for Samba, a LanManager like file and printer server for GNU/Linux and Unix-like systems caused the daemon to crash upon reload. This has been fixed. For reference below is the original advisory text: Greg MacManus discovered an integer overflow in the smb daemon from Samba, a LanManager like file and printer server for GNU/Linux and Unix-like systems. Requesting a very large number of access control descriptors from the server could exploit the integer overflow, which may result in a buffer overflow which could lead to the execution of arbitrary code with root privileges. Upstream developers have discovered more possible integer overflows that are fixed with this update as well. For the stable distribution (woody) these problems have been fixed in version 2.2.3a-15. The version in the unstable distribution (sid) is not affected by this new problem. We recommend that you upgrade your samba packages.