CVE-2018-1000097
moderate-risk
Published 2018-03-13
Sharutils sharutils (unshar command) version 4.15.2 contains a Buffer Overflow vulnerability in Affected component on the file unshar.c at line 75, function looks_like_c_code. Failure to perform checking of the buffer containing input line. that can result in Could lead to code execution. This attack appear to be exploitable via Victim have to run unshar command on a specially crafted file..
Do I need to act?
~
3.6% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (6)
References (6)
Mailing List
http://seclists.org/bugtraq/2018/Feb/54
Third Party Advisory
https://usn.ubuntu.com/3605-1/
Third Party Advisory
https://www.debian.org/security/2018/dsa-4167
Mailing List
http://seclists.org/bugtraq/2018/Feb/54
Third Party Advisory
https://usn.ubuntu.com/3605-1/
Third Party Advisory
https://www.debian.org/security/2018/dsa-4167
44
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
7/34 · Low
Exposure
13/34 · Low