This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.
The remote Mandrake Linux host is missing a security update.
Shaun Colley discovered a buffer overflow in shar that was triggered
by output files (using -o) with names longer than 49 characters which
could be exploited to run arbitrary attacker-specified code.
Ulf Harnhammar discovered that shar does not check the data length
returned by the wc command.
Joey Hess discovered that unshar would create temporary files in an
insecure manner which could allow a symbolic link attack to create or
overwrite arbitrary files with the privileges of the user using
The updated packages have been patched to correct these issues.
See also :
Update the affected sharutils package.
Risk factor :
High / CVSS Base Score : 7.5