How to Buy
This script is Copyright (C) 2005-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
An updated sharutils package is now available.
This update has been rated as having low security impact by the Red
Hat Security Response Team.
The sharutils package contains a set of tools for encoding and
decoding packages of files in binary or text format.
A stack based overflow bug was found in the way shar handles the -o
option. If a user can be tricked into running a specially crafted
command, it could lead to arbitrary code execution. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CVE-2004-1772 to this issue. Please note that this issue does not
affect Red Hat Enterprise Linux 4.
Two buffer overflow bugs were found in sharutils. If an attacker can
place a malicious 'wc' command on a victim's machine, or trick a
victim into running a specially crafted command, it could lead to
arbitrary code execution. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2004-1773 to this
A bug was found in the way unshar creates temporary files. A local
user could use symlinks to overwrite arbitrary files the victim
running unshar has write access to. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2005-0990
to this issue.
All users of sharutils should upgrade to this updated package, which
includes backported fixes to correct these issues.
See also :
Update the affected sharutils package.
Risk factor :
High / CVSS Base Score : 7.5
Family: Red Hat Local Security Checks
Nessus Plugin ID: 18147 ()
CVE ID: CVE-2004-1772CVE-2004-1773CVE-2005-0990
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.