Multiple buffer overflows in sharutils 4.2.1 and earlier may allow attackers to execute arbitrary code via (1) long output from wc to shar, or (2) unknown vectors in unshar.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Sharutils | Gnu | 4.2 (including) | 4.2 (including) |
Sharutils | Gnu | 4.2.1 (including) | 4.2.1 (including) |
Red Hat Enterprise Linux 3 | RedHat | sharutils-0:4.2.1-16.2 | * |
Red Hat Enterprise Linux 4 | RedHat | sharutils-0:4.2.1-22.2 | * |
Sharutils | Ubuntu | dapper | * |
Sharutils | Ubuntu | devel | * |
Sharutils | Ubuntu | edgy | * |
Sharutils | Ubuntu | feisty | * |