Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.
The samba project reports:
Malicious servers can cause Samba client code to return filenames containing
path separators to calling code.
When the password contains multi-byte (non-ASCII) characters, the check
password script does not receive the full password string.
Users with the "get changes" extended access right can crash the AD DC LDAP
server by requesting an attribute using the range= syntax.