From 1a9b45328727c38021b5a1fb1f4d641aecc35cfe Mon Sep 17 00:00:00 2001 From: simon Date: Tue, 12 Oct 2004 23:46:41 +0000 Subject: Document a vulnerability in sharutils. Approved by: nectar --- security/vuxml/vuln.xml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) (limited to 'security') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index feda937dd423..127c37b98681 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,37 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> + + sharutils -- buffer overflows + + + sharutils + 0 + + + + +

From Gentoo advisory GLSA 200410-01:

+
+

sharutils contains two buffer overflows. Ulf Harnhammar + discovered a buffer overflow in shar.c, where the length + of data returned by the wc command is not checked. + Florian Schilhabel discovered another buffer overflow in + unshar.c.

+
+ +
+ + 11298 + http://www.gentoo.org/security/en/glsa/glsa-200410-01.xml + http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=265904 + + + 2004-08-15 + 2004-10-13 + +
+ mail-notification -- denial-of-service vulnerability -- cgit