Описание
Stack-based buffer overflow in shar in GNU sharutils 4.2.1 allows local users to execute arbitrary code via a long -o command line argument.
Stack-based buffer overflow in shar in GNU sharutils 4.2.1 allows local users to execute arbitrary code via a long -o command line argument.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2004-1772
- https://bugzilla.fedora.us/show_bug.cgi?id=2155
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15759
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11722
- http://marc.info/?l=bugtraq&m=108137386310299&w=2
- http://www.redhat.com/support/errata/RHSA-2005-377.html
- http://www.securityfocus.com/archive/1/359639
- http://www.securityfocus.com/bid/10066
EPSS
CVE ID
Связанные уязвимости
Stack-based buffer overflow in shar in GNU sharutils 4.2.1 allows local users to execute arbitrary code via a long -o command line argument.
Stack-based buffer overflow in shar in GNU sharutils 4.2.1 allows local users to execute arbitrary code via a long -o command line argument.
Stack-based buffer overflow in shar in GNU sharutils 4.2.1 allows local users to execute arbitrary code via a long -o command line argument.
Stack-based buffer overflow in shar in GNU sharutils 4.2.1 allows loca ...
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS