Sharutils sharutils (unshar command) version 4.15.2 contains a Buffer Overflow vulnerability in Affected component on the file unshar.c at line 75, function looks_like_c_code. Failure to perform checking of the buffer containing input line. that can result in Could lead to code execution. This attack appear to be exploitable via Victim have to run unshar command on a specially crafted file..
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4167-1 | sharutils security update |
EUVD |
EUVD-2018-1835 | Sharutils sharutils (unshar command) version 4.15.2 contains a Buffer Overflow vulnerability in Affected component on the file unshar.c at line 75, function looks_like_c_code. Failure to perform checking of the buffer containing input line. that can result in Could lead to code execution. This attack appear to be exploitable via Victim have to run unshar command on a specially crafted file.. |
Ubuntu USN |
USN-3605-1 | Sharutils vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T12:33:49.183Z
Reserved: 2018-03-12T00:00:00
Link: CVE-2018-1000097
No data.
Status : Modified
Published: 2018-03-13T01:29:00.967
Modified: 2024-11-21T03:39:38.400
Link: CVE-2018-1000097
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN