Vulnerability Details : CVE-2004-1773
Multiple buffer overflows in sharutils 4.2.1 and earlier may allow attackers to execute arbitrary code via (1) long output from wc to shar, or (2) unknown vectors in unshar.
Vulnerability category: Execute code
Products affected by CVE-2004-1773
- cpe:2.3:a:gnu:sharutils:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:sharutils:4.2.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-1773
1.85%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-1773
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2004-1773
-
http://security.gentoo.org/glsa/glsa-200410-01.xml
sharutils: Buffer overflows in shar.c and unshar.c (GLSA 200410-01) — Gentoo securityPatch;Vendor Advisory
-
https://bugzilla.fedora.us/show_bug.cgi?id=2155
Patch
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11093
404 Not Found
-
http://www.redhat.com/support/errata/RHSA-2005-377.html
Support
-
http://www.securityfocus.com/bid/11298
Patch
Jump to