CVE-2014-0178.html:

===========================================================
== Subject:     Uninitialized memory exposure.
==
== CVE ID#:     CVE-2014-0178
==
== Versions:    Samba 3.6.6 - 4.1.7 (inclusive)
==
== Summary:     Samba 3.6.6 to 4.1.7 are affected by a
==              vulnerability that allows an authenticated
==		client to retrieve eight bytes of
==		uninitialized server memory when a
==		shadow-copy VFS module is enabled.
==
===========================================================

===========
Description
===========

In preparing a response to an authenticated FSCTL_GET_SHADOW_COPY_DATA
or FSCTL_SRV_ENUMERATE_SNAPSHOTS client request, affected versions of
Samba do not initialize 8 bytes of the 16 byte SRV_SNAPSHOT_ARRAY
response field. The uninitialized buffer is sent back to the client.

A non-default VFS module providing the get_shadow_copy_data_fn() hook
must be explicitly enabled for Samba to process the aforementioned
client requests. Therefore, only configurations with "shadow_copy" or
"shadow_copy2" specified for the "vfs objects" parameter are vulnerable.


==================
Patch Availability
==================

Patches addressing this issue have been posted to:

    http://www.samba.org/samba/security/

Samba versions 4.0.18 and 4.1.8 will be released with fixes for
this issue. Immediate security releases will not be issued, due to the
low severity of the vulnerability.


==========
Workaround
==========

To avoid the vulnerability, affected versions can be configured without
"shadow_copy" or "shadow_copy2" specified for the "vfs objects"
parameter. This is the default configuration.


=======
Credits
=======

This vulnerability was found and fixed by Christof Schmitt of the Samba
team.