CVE-2018-1000097
Publication date 12 March 2018
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
Sharutils sharutils (unshar command) version 4.15.2 contains a Buffer Overflow vulnerability in Affected component on the file unshar.c at line 75, function looks_like_c_code. Failure to perform checking of the buffer containing input line. that can result in Could lead to code execution. This attack appear to be exploitable via Victim have to run unshar command on a specially crafted file..
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| sharutils | ||
| 16.04 LTS xenial |
Fixed 1:4.15.2-1ubuntu0.1
|
|
| 14.04 LTS trusty |
Fixed 1:4.14-1ubuntu1.1
|
Patch details
| Package | Patch details |
|---|---|
| sharutils |
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | Required |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3605-1
- Sharutils vulnerability
- 22 March 2018