Nessus Plugin #15407
Plugin Index
Note: This file has been created from a
downloaded version of the Nessus Plugins
from
http://www.nessus.org/.
Therefore, the information here can be outdated.
[GLSA-200410-01] sharutils: Buffer overflows in shar.c and unshar.c
- Family:
- Gentoo Local Security Checks
- Category:
- infos
- Copyright:
- (C) 2004 Michel Arboi
- Summary:
- sharutils: Buffer overflows in shar.c and unshar.c
- Version:
- $Revision: 1.1 $
- Cve_id:
- -
- Bugtraq_id:
- 11298
- Xrefs:
- GLSA:200410-01
- Description:
- The remote host is affected by the vulnerability described in GLSA-200410-01
(sharutils: Buffer overflows in shar.c and unshar.c)
sharutils contains two buffer overflows. Ulf Harnhammar discovered a buffer
overflow in shar.c, where the length of data returned by the wc command is
not checked. Florian Schilhabel discovered another buffer overflow in
unshar.c.
Impact
An attacker could exploit these vulnerabilities to execute arbitrary code
as the user running one of the sharutils programs.
Workaround
There is no known workaround at this time.
References:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=265904
Solution:
All sharutils users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=app-arch/sharutils-4.2.1-r10"
# emerge ">=app-arch/sharutils-4.2.1-r10"
Risk factor : Medium
Generiert am 27.04.2005 um 18:49:54 Uhr.