Nessus Plugin #15407

Plugin Index

Note: This file has been created from a downloaded version of the Nessus Plugins from http://www.nessus.org/. Therefore, the information here can be outdated.

[GLSA-200410-01] sharutils: Buffer overflows in shar.c and unshar.c

Family:
Gentoo Local Security Checks
Category:
infos
Copyright:
(C) 2004 Michel Arboi
Summary:
sharutils: Buffer overflows in shar.c and unshar.c
Version:
$Revision: 1.1 $
Cve_id:
-
Bugtraq_id:
11298
Xrefs:
GLSA:200410-01
Description:
The remote host is affected by the vulnerability described in GLSA-200410-01
(sharutils: Buffer overflows in shar.c and unshar.c)


sharutils contains two buffer overflows. Ulf Harnhammar discovered a buffer
overflow in shar.c, where the length of data returned by the wc command is
not checked. Florian Schilhabel discovered another buffer overflow in
unshar.c.

Impact

An attacker could exploit these vulnerabilities to execute arbitrary code
as the user running one of the sharutils programs.

Workaround

There is no known workaround at this time.

References:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=265904


Solution:
All sharutils users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=app-arch/sharutils-4.2.1-r10"
# emerge ">=app-arch/sharutils-4.2.1-r10"


Risk factor : Medium
Generiert am 27.04.2005 um 18:49:54 Uhr.