Samba is vulnerable to privilege escalation attacks. A remote authenticated attacker can send a specially crafted Privilege Attribute Certificate (PAC) to trigger an overflow and cause the target winbindd service to crash. Additionally a local service with access to the winbindd privileged pipe can offer elevated access permissions.
rhn.redhat.com/errata/RHSA-2017-0494.html
rhn.redhat.com/errata/RHSA-2017-0495.html
rhn.redhat.com/errata/RHSA-2017-0662.html
rhn.redhat.com/errata/RHSA-2017-0744.html
www.securityfocus.com/bid/94994
www.securitytracker.com/id/1037495
access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Release_Notes/index.html
access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Technical_Notes/index.html
access.redhat.com/errata/RHSA-2017:0662
access.redhat.com/errata/RHSA-2017:1265
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1327697
bugzilla.redhat.com/show_bug.cgi?id=1372611
bugzilla.redhat.com/show_bug.cgi?id=1413672
kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730
www.samba.org/samba/security/CVE-2016-2125.html
www.samba.org/samba/security/CVE-2016-2126.html