Sharutils sharutils (unshar command) version 4.15.2 contains a Buffer Overflow vulnerability in Affected component on the file unshar.c at line 75, function looks_like_c_code. Failure to perform checking of the buffer containing input line. that can result in Could lead to code execution. This attack appear to be exploitable via Victim have to run unshar command on a specially crafted file..
References
Link | Resource |
---|---|
http://seclists.org/bugtraq/2018/Feb/54 | Mailing List Third Party Advisory |
https://usn.ubuntu.com/3605-1/ | Third Party Advisory |
https://www.debian.org/security/2018/dsa-4167 | Third Party Advisory |
http://seclists.org/bugtraq/2018/Feb/54 | Mailing List Third Party Advisory |
https://usn.ubuntu.com/3605-1/ | Third Party Advisory |
https://www.debian.org/security/2018/dsa-4167 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 03:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/bugtraq/2018/Feb/54 - Mailing List, Third Party Advisory | |
References | () https://usn.ubuntu.com/3605-1/ - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4167 - Third Party Advisory |
Information
Published : 2018-03-13 01:29
Updated : 2024-11-21 03:39
NVD link : CVE-2018-1000097
Mitre link : CVE-2018-1000097
CVE.ORG link : CVE-2018-1000097
JSON object : View
Products Affected
gnu
- sharutils
canonical
- ubuntu_linux
debian
- debian_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer