Samba updated the patch and patched the DoS vulnerability Picture 1 One of the problems caused by the null pointer dereference when processing the sequence of SMB header parameters includes the specific combination of the flag - flag. While other errors are related to reading mechanism when processing 1 action called Session Setup AndX, and require adding the value chain Security Binary Large Object (security blob).
Both of these errors were actually fixed in April with version 3.5.2. Users are advised to install or update as soon as possible, along with Stratsec software has discovered the above errors.