3.4. Vulnerabilities in Microsoft SMB/CIFS implementation