The folks at badlock.org provide more details on the bug details found in the SMB protocol. The basic advice still counts : apply the patches provided by your vendor as soon as possible.
On April 12th, 2016, a crucial security vulnerability in Windows and Samba will be disclosed.
At this point the scope and full impact of the vulnerability is not known but it is probably a design flaw in the SMB protocol.
It is assumed that the bug is to be found in a file or resource locking mechanism within the SMB implementation and might lead to a remote code execution flaw.
The SMB protocol is primarily used for file- and printsharing on internal networks.
The vulnerability will affect most operating systems supporting SMB :
Possible vulnerable clients supporting SMB (which includes most systems) might also be affected if they get tricked into connecting to a vulnerable -outside their network- SMB server.
In conclusion this means almost every system is affected.
Because details of this vulnerability are not yet known, it is impossible to predict the exact impact. Based on the available information this vulnerability might lead to the remote execution of arbitrary code. In essence this means that exploitation of this vulnerability might allow an attacker to conduct code at will on the targetted system, which could potentially lead to
A possible mitigation factor might be the fact that the SMB protocol should only be available on internal networks. This means that an attack could be limited to a "local" attack. Do take into account though that, when combined with other attack vectors an outside attacker might still be able to abuse this weakness.
Firstly : monitor the website of the Badlock Bug  very closely for future updates. Full details will be announced on 12 April 2016.
Secondly : get prepared. You can get yourself prepared by
There is no need for panic, getting prepared and having good patch management procedures can help you.