### [CVE-2018-10858](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858) ![](https://img.shields.io/static/v1?label=Product&message=samba&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20&color=brighgreen) ### Description A heap-buffer overflow was found in the way samba clients processed extra long filename in a directory listing. A malicious samba server could use this flaw to cause arbitrary code execution on a samba client. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable. ### POC #### Reference - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 - https://usn.ubuntu.com/3738-1/ - https://usn.ubuntu.com/3738-1/ #### Github No PoCs found on GitHub currently.