Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.52110
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2005:377
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2005:377.

The sharutils package contains a set of tools for encoding and decoding
packages of files in binary or text format.

A stack based overflow bug was found in the way shar handles the -o option.
If a user can be tricked into running a specially crafted command, it could
lead to arbitrary code execution. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2004-1772 to this issue.
Please note that this issue does not affect Red Hat Enterprise Linux 4.

Two buffer overflow bugs were found in sharutils. If an attacker can place
a malicious 'wc' command on a victim's machine, or trick a victim into
running a specially crafted command, it could lead to arbitrary code
execution. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2004-1773 to this issue.

A bug was found in the way unshar creates temporary files. A local user
could use symlinks to overwrite arbitrary files the victim running unshar
has write access to. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2005-0990 to this issue.

All users of sharutils should upgrade to this updated package, which
includes backported fixes to correct these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2005-377.html

Risk factor : High

CVSS Score:
7.5

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2004-1772
BugTraq ID: 10066
http://www.securityfocus.com/bid/10066
Bugtraq: 20040406 GNU Sharutils buffer overflow vulnerability. (Google Search)
http://www.securityfocus.com/archive/1/359639
https://bugzilla.fedora.us/show_bug.cgi?id=2155
http://marc.info/?l=bugtraq&m=108137386310299&w=2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11722
http://www.redhat.com/support/errata/RHSA-2005-377.html
XForce ISS Database: sharutils-shar-bo(15759)
https://exchange.xforce.ibmcloud.com/vulnerabilities/15759
Common Vulnerability Exposure (CVE) ID: CVE-2004-1773
BugTraq ID: 11298
http://www.securityfocus.com/bid/11298
http://security.gentoo.org/glsa/glsa-200410-01.xml
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11093
Common Vulnerability Exposure (CVE) ID: CVE-2005-0990
BugTraq ID: 12981
http://www.securityfocus.com/bid/12981
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=302412
https://bugzilla.ubuntu.com/show_bug.cgi?id=8459
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9613
https://usn.ubuntu.com/104-1/
XForce ISS Database: sharutils-temp-file-symlink(19957)
https://exchange.xforce.ibmcloud.com/vulnerabilities/19957
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.