{"id":"CVE-2018-10858","details":"A heap-buffer overflow was found in the way samba clients processed extra long filename in a directory listing. A malicious samba server could use this flaw to cause arbitrary code execution on a samba client. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.","modified":"2026-04-16T06:15:17.060143236Z","published":"2018-08-22T17:29:00.367Z","related":["SUSE-SU-2018:2318-1","SUSE-SU-2018:2319-1","SUSE-SU-2018:2320-1","SUSE-SU-2018:2320-2","SUSE-SU-2018:2321-1","SUSE-SU-2018:2329-1","SUSE-SU-2018:2339-1","SUSE-SU-2018:2339-2","openSUSE-SU-2024:11365-1"],"references":[{"type":"WEB","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10284"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202003-52"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3738-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4271"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2612"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3056"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20180814-0001/"},{"type":"ADVISORY","url":"https://www.samba.org/samba/security/CVE-2018-10858.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/105085"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1042002"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2613"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10858"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/samba-team/samba","events":[{"introduced":"0"},{"fixed":"18df99ba0bfc466b877d5875bef3ab1279b0e7dc"},{"introduced":"d1e69845e28c20a491c4cd60c712b46ddfcb9dc0"},{"fixed":"3e5da7e8878a78da96fbdccd05953c791560a6b5"},{"introduced":"5a9d09fee44052e18ce241ec28f78498d2e20d73"},{"fixed":"626c489c2c879aef8b82efe9f7e832cca0183f4d"},{"introduced":"0"},{"last_affected":"192c05556f786b4523fb325cee6d87b251aee059"},{"introduced":"0"},{"last_affected":"192c05556f786b4523fb325cee6d87b251aee059"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"4.6.16"},{"introduced":"4.7.0"},{"fixed":"4.7.9"},{"introduced":"4.8.0"},{"fixed":"4.8.4"},{"introduced":"0"},{"last_affected":"4.0"},{"introduced":"0"},{"last_affected":"4.0"}]}}],"versions":["ldb-1.1.0","ldb-1.1.10","ldb-1.1.11","ldb-1.1.12","ldb-1.1.13","ldb-1.1.14","ldb-1.1.15","ldb-1.1.16","ldb-1.1.17","ldb-1.1.18","ldb-1.1.19","ldb-1.1.2","ldb-1.1.20","ldb-1.1.21","ldb-1.1.22","ldb-1.1.23","ldb-1.1.25","ldb-1.1.26","ldb-1.1.27","ldb-1.1.28","ldb-1.1.29","ldb-1.1.3","ldb-1.1.4","ldb-1.1.5","ldb-1.1.6","ldb-1.1.8","ldb-1.1.9","ldb-1.2.3","ldb-1.3.3","ldb-1.3.4","ldb-1.3.5","samba-4.0.0alpha10","samba-4.0.0alpha17","samba-4.0.0alpha18","samba-4.0.0alpha19","samba-4.0.0alpha20","samba-4.0.0alpha21","samba-4.0.0alpha6","samba-4.0.0alpha7","samba-4.0.0alpha8","samba-4.0.0alpha9","samba-4.0.0beta1","samba-4.0.0beta2","samba-4.0.0beta3","samba-4.0.0beta4","samba-4.0.0beta5","samba-4.0.0beta6","samba-4.0.0beta7","samba-4.0.0beta8","samba-4.0.0rc1","samba-4.2.0rc1","samba-4.3.0rc1","samba-4.4.0rc1","samba-4.5.0rc1","samba-4.6.0","samba-4.6.0rc1","samba-4.6.0rc2","samba-4.6.0rc3","samba-4.6.0rc4","samba-4.6.10","samba-4.6.12","samba-4.6.13","samba-4.6.15","samba-4.6.3","samba-4.6.5","samba-4.6.7","samba-4.6.9","samba-4.7.0","samba-4.7.1","samba-4.7.2","samba-4.7.4","samba-4.7.5","samba-4.7.7","samba-4.7.8","samba-4.8.0","samba-4.8.1","samba-4.8.2","samba-4.8.3","samba-misc-tags/initial-v4-0-unstable","talloc-1.3.1","talloc-2.0.0","talloc-2.0.7","talloc-2.0.8","talloc-2.1.0","talloc-2.1.1","talloc-2.1.2","talloc-2.1.3","talloc-2.1.4","talloc-2.1.5","talloc-2.1.6","talloc-2.1.7","talloc-2.1.8","tdb-1.1.5","tdb-1.2.0","tdb-1.2.1","tdb-1.2.10","tdb-1.2.11","tdb-1.2.12","tdb-1.2.13","tdb-1.3.0","tdb-1.3.1","tdb-1.3.10","tdb-1.3.11","tdb-1.3.12","tdb-1.3.2","tdb-1.3.3","tdb-1.3.4","tdb-1.3.5","tdb-1.3.6","tdb-1.3.7","tdb-1.3.8","tdb-1.3.9","tevent-0.9.11","tevent-0.9.12","tevent-0.9.13","tevent-0.9.14","tevent-0.9.15","tevent-0.9.16","tevent-0.9.17","tevent-0.9.18","tevent-0.9.19","tevent-0.9.20","tevent-0.9.21","tevent-0.9.22","tevent-0.9.23","tevent-0.9.24","tevent-0.9.25","tevent-0.9.26","tevent-0.9.27","tevent-0.9.28","tevent-0.9.29","tevent-0.9.30","tevent-0.9.31","tevent-0.9.8"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-10858.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}