CVE-2018-1000097

EUVD-2018-1835
Sharutils sharutils (unshar command) version 4.15.2 contains a Buffer Overflow vulnerability in Affected component on the file unshar.c at line 75, function looks_like_c_code. Failure to perform checking of the buffer containing input line. that can result in Could lead to code execution. This attack appear to be exploitable via Victim have to run unshar command on a specially crafted file..
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
NONE
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 87%
Affected Products (NVD)
VendorProductVersion
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
17.10
debiandebian_linux
8.0
debiandebian_linux
9.0
gnusharutils
4.15.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
sharutils
bookworm
1:4.15.2-9
fixed
bullseye
1:4.15.2-5
fixed
sid
1:4.15.2-9
fixed
trixie
1:4.15.2-9
fixed
wheezy
not-affected
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
sharutils
artful
Fixed 1:4.15.2-2ubuntu0.1
released
trusty
Fixed 1:4.14-1ubuntu1.1
released
xenial
Fixed 1:4.15.2-1ubuntu0.1
released