Vulnerabilities
Vulnerable Software
Gnu:  >> Sharutils  Security Vulnerabilities
Sharutils sharutils (unshar command) version 4.15.2 contains a Buffer Overflow vulnerability in Affected component on the file unshar.c at line 75, function looks_like_c_code. Failure to perform checking of the buffer containing input line. that can result in Could lead to code execution. This attack appear to be exploitable via Victim have to run unshar command on a specially crafted file..
CVSS Score
7.8
EPSS Score
0.029
Published
2018-03-13
unshar (unshar.c) in sharutils 4.2.1 allows local users to overwrite arbitrary files via a symlink attack on the unsh.X temporary file.
CVSS Score
2.1
EPSS Score
0.001
Published
2005-05-02
Stack-based buffer overflow in shar in GNU sharutils 4.2.1 allows local users to execute arbitrary code via a long -o command line argument.
CVSS Score
4.6
EPSS Score
0.001
Published
2004-12-31
Multiple buffer overflows in sharutils 4.2.1 and earlier may allow attackers to execute arbitrary code via (1) long output from wc to shar, or (2) unknown vectors in unshar.
CVSS Score
7.5
EPSS Score
0.018
Published
2004-12-31
uudecode, as available in the sharutils package before 4.2.1, does not check whether the filename of the uudecoded file is a pipe or symbolic link, which could allow attackers to overwrite files or execute commands.
CVSS Score
7.2
EPSS Score
0.001
Published
2002-05-29


Contact Us

Shodan ® - All rights reserved