cve2015-0261_01 cve2015-0261-ipv6.pcap cve2015-0261-ipv6.out -v
cve2015-0261_02 cve2015-0261-crash.pcap cve2015-0261-crash.out -v
-# bad packets from Luis Rocha
-cve-2018-10105-segv-sflowprint cve-2018-10105-segv-sflowprint.pcap cve-2018-10105-segv-sflowprint.out -v
-
# OLSRv1 tests
olsrv1_1 OLSRv1_HNA_sgw_1.pcap OLSRv1_HNA_sgw_1.out -v
kh-tcpdump-003 kh-tcpdump-003.pcap kh-tcpdump-003.out
-# CVE-2019-15116
\ No newline at end of file
+# CVE-2018-10105 bad packets from Luis Rocha
+cve-2018-10105-segv-sflowprint cve-2018-10105-segv-sflowprint.pcap cve-2018-10105-segv-sflowprint.out -v
+cve-2018-10105_smbprint-readofsize1 cve-2018-10105_smbprint-readofsize1.pcap cve-2018-10105_smbprint-readofsize1.out
+cve-2018-10105_smbutil_withoutasan cve-2018-10105_smbutil_withoutasan.pcap cve-2018-10105_smbutil_withoutasan.out
+
+
--- /dev/null
+IP 192.168.56.55.445 > 192.168.56.119.49199: Flags [P.], seq 4267808374:4267808462, ack 628292694, win 63102, length 88 SMB PACKET: SMBtrans2 (REPLY)
+
+IP 192.168.56.119.49199 > 192.168.56.55.445: Flags [P.], seq 1:75, ack 88, win 254, length 74 SMB PACKET: SMBtrans2 (REQUEST)
+
+IP 192.168.56.55.445 > 192.168.56.119.49199: Flags [P.], seq 88:168, ack 75, win 62978, length 80 SMB PACKET: SMBtrans2 (REPLY)
+
+IP 192.168.56.119.49199 > 192.168.56.55.445: Flags [P.], seq 75:151, ack 168, win 253, length 76 SMB PACKET: SMBtrans2 (REQUEST)
+
--- /dev/null
+IP 192.168.56.55.445 > 192.168.56.119.49199: Flags [P.], seq 4267808374:4267808462, ack 628292694, win 63102, length 88 SMB PACKET: SMBtrans2 (REPLY)
+
+IP 192.168.56.119.49199 > 192.168.56.55.445: Flags [P.], seq 1:75, ack 88, win 254, length 74 SMB PACKET: SMBtrans2 (REQUEST)
+
+IP 192.168.56.55.445 > 192.168.56.119.49199: Flags [P.], seq 88:168, ack 75, win 63028, length 80 SMB PACKET: SMBtrans2 (REPLY)
+
+IP 192.168.56.119.49199 > 192.168.56.55.445: Flags [P.], seq 75:151, ack 168, win 253, length 76 SMB-over-TCP packet:(raw data or continuation?)
+