Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.
From VID-50A1BBC9-FB80-11E9-9E70-005056A311D1:
The samba project reports:
Malicious servers can cause Samba client code to return filenames containing
path separators to calling code.
When the password contains multi-byte (non-ASCII) characters, the check
password script does not receive the full password string.
Users with the "get changes" extended access right can crash the AD DC LDAP
server by requesting an attribute using the range= syntax.
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center