Mandrake Linux Security Advisory : sharutils (MDKSA-2005:067)

This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.


Synopsis :

The remote Mandrake Linux host is missing a security update.

Description :

Shaun Colley discovered a buffer overflow in shar that was triggered
by output files (using -o) with names longer than 49 characters which
could be exploited to run arbitrary attacker-specified code.

Ulf Harnhammar discovered that shar does not check the data length
returned by the wc command.

Joey Hess discovered that unshar would create temporary files in an
insecure manner which could allow a symbolic link attack to create or
overwrite arbitrary files with the privileges of the user using
unshar.

The updated packages have been patched to correct these issues.

See also :

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=302412

Solution :

Update the affected sharutils package.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: Mandriva Local Security Checks

Nessus Plugin ID: 18002 (mandrake_MDKSA-2005-067.nasl)

Bugtraq ID:

CVE ID: CVE-2004-1772
CVE-2004-1773
CVE-2005-0990

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now