First published: Thu Mar 22 2018(Updated: )
It was discovered that Sharutils incorrectly handled certain files. An attacker could possibly use this to execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/sharutils | <1:4.15.2-2ubuntu0.1 | 1:4.15.2-2ubuntu0.1 |
Ubuntu OpenSSH Client | =17.10 | |
All of | ||
ubuntu/sharutils | <1:4.15.2-1ubuntu0.1 | 1:4.15.2-1ubuntu0.1 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/sharutils | <1:4.14-1ubuntu1.1 | 1:4.14-1ubuntu1.1 |
Ubuntu OpenSSH Client | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-3605-1 is classified as a potentially critical vulnerability that allows an attacker to execute arbitrary code.
To fix USN-3605-1, update the sharutils package to the latest version provided for your Ubuntu release.
USN-3605-1 affects Ubuntu versions 14.04, 16.04, and 17.10 that have vulnerable versions of the sharutils package installed.
An attacker exploiting USN-3605-1 can potentially execute arbitrary code on the affected system.
Yes, USN-3605-1 relates to CVE-2018-1000097, which details the specific vulnerability in the sharutils package.