First published: Mon Mar 12 2018(Updated: )
Sharutils sharutils (unshar command) version 4.15.2 contains a Buffer Overflow vulnerability in Affected component on the file unshar.c at line 75, function looks_like_c_code. Failure to perform checking of the buffer containing input line. that can result in Could lead to code execution. This attack appear to be exploitable via Victim have to run unshar command on a specially crafted file..
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/sharutils | <=1:4.14-2<=1:4.15.2-2 | 1:4.15.2-3 1:4.14-2+deb8u1 1:4.15.2-2+deb9u1 |
ubuntu/sharutils | <1:4.15.2-2ubuntu0.1 | 1:4.15.2-2ubuntu0.1 |
ubuntu/sharutils | <1:4.14-1ubuntu1.1 | 1:4.14-1ubuntu1.1 |
ubuntu/sharutils | <1:4.15.2-1ubuntu0.1 | 1:4.15.2-1ubuntu0.1 |
debian/sharutils | 1:4.15.2-5 1:4.15.2-9 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 | |
Debian | =8.0 | |
Debian | =9.0 | |
SUSE Sharutils | =4.15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000097 is classified as a critical vulnerability due to the potential for remote code execution.
To remediate CVE-2018-1000097, update the sharutils package to version 1:4.15.2-5 or later for Debian, or 1:4.15.2-2ubuntu0.1 or later for Ubuntu.
Affected versions of sharutils include 4.15.2 and earlier, specifically those versions before the fixed releases.
CVE-2018-1000097 is a buffer overflow vulnerability that occurs due to improper handling of input buffers.
CVE-2018-1000097 affects Debian and Ubuntu systems running vulnerable versions of the sharutils package.