Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2005:067: sharutils

Vulnerability Assessment Details

MDKSA-2005:067: sharutils

Vulnerability Assessment Summary
Check for the version of the sharutils package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2005:067 (sharutils).

Shaun Colley discovered a buffer overflow in shar that was triggered by output
files (using -o) with names longer than 49 characters which could be exploited
to run arbitrary attacker-specified code.

Ulf Harnhammar discovered that shar does not check the data length returned by
the wc command.

Joey Hess discovered that unshar would create temporary files in an insecure
manner which could permit a symbolic link attack to create or overwrite
arbitrary files with the rights of the user using unshar.

The updated packages have been patched to correct these issues.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

COMMODORE AMIGA 1020 EXTERNAL 5.25Shufflepuck Café game for Commodore Amiga computers
Shufflepuck Café game for Commodore Amiga computers picturePopulous game for Commodore Amiga computers
Populous game for Commodore Amiga computers picture(16)100ns 1Mx1 18pin DRAM RAM Memory Chips 2MB fo Amiga A2058 SUPRA RAM 2000 etc
(16)100ns 1Mx1 18pin DRAM RAM Memory Chips 2MB fo Amiga A2058 SUPRA RAM 2000 etc picture


No Discussions have been posted on this vulnerability.