CVE-2018-1000097

Sharutils sharutils (unshar command) version 4.15.2 contains a Buffer Overflow vulnerability in Affected component on the file unshar.c at line 75, function looks_like_c_code. Failure to perform checking of the buffer containing input line. that can result in Could lead to code execution. This attack appear to be exploitable via Victim have to run unshar command on a specially crafted file..
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
NONE
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 85%
VendorProductVersion
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
17.10
debiandebian_linux
8.0
debiandebian_linux
9.0
gnusharutils
4.15.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
sharutils
bullseye
1:4.15.2-5
fixed
wheezy
not-affected
sid
1:4.15.2-9
fixed
trixie
1:4.15.2-9
fixed
bookworm
1:4.15.2-9
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
sharutils
artful
Fixed 1:4.15.2-2ubuntu0.1
released
xenial
Fixed 1:4.15.2-1ubuntu0.1
released
trusty
Fixed 1:4.14-1ubuntu1.1
released