CVE-2004-1773

Multiple buffer overflows in sharutils 4.2.1 and earlier may allow attackers to execute arbitrary code via (1) long output from wc to shar, or (2) unknown vectors in unshar.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnu:sharutils:4.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:sharutils:4.2.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:51

Type Values Removed Values Added
References () http://security.gentoo.org/glsa/glsa-200410-01.xml - Patch, Vendor Advisory () http://security.gentoo.org/glsa/glsa-200410-01.xml - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2005-377.html - () http://www.redhat.com/support/errata/RHSA-2005-377.html -
References () http://www.securityfocus.com/bid/11298 - Patch () http://www.securityfocus.com/bid/11298 - Patch
References () https://bugzilla.fedora.us/show_bug.cgi?id=2155 - Patch () https://bugzilla.fedora.us/show_bug.cgi?id=2155 - Patch
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11093 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11093 -

Information

Published : 2004-12-31 05:00

Updated : 2024-11-20 23:51


NVD link : CVE-2004-1773

Mitre link : CVE-2004-1773

CVE.ORG link : CVE-2004-1773


JSON object : View

Products Affected

gnu

  • sharutils