Bugzilla – Bug 61557
VUL-0: CVE-2004-1772: buffer overflow in sharutils
Last modified: 2021-10-02 10:20:41 UTC
To: GNU Announcements <info-gnu@gnu.org> Date: Wed, 29 Sep 2004 21:13:55 -0400 (EDT) From: Bruce Korb <bkorb@.veritas.com> Cc: bug-gnu-utils@gnu.org Subject: Release of version 4.3.77 of sharutils Reply-To: bug-gnu-utils@gnu.org Errors-To: bug-gnu-utils-bounces+schwab=suse.de@gnu.org GNU sharutils consists of two pairs of utilities: shar and unshar, and uuencode and uudecode. "shar" makes so-called shell archives out of many files, preparing them for transmission by electronic mail services (converting binary data to ascii representations, breaking the text into multiple shar scripts, etc.). "unshar" is the safe way to reassemble and extract the original files. It will automatically strip off the mail headers and other introductory text. "uuencode" and "uudecode" are programs that convert binary files into ascii text so that the original data can pass through the email system without having intermediate hosts "fixing" the files en route. NEWS: Version 4.3.77 - September 2004, by Bruce Korb * Fixed a buffer overrun exploit
<!-- SBZ_reproduce --> n/a at this time.
Andreas has found additional buffer overflow problems. How easy is this to trigger, Andreas?
The other overrun is triggered when you call shar with a long file name as argument, or when it encounters such a long name while descending a directory. This file name is then used to construct and execute a shell command in a fixed sized buffer. There are also quoting bugs, both in these directly executed shell commands and in the generated shar file, which trigger when a file name contains a single quote character.
public mostly
my testcase segfaulted... pushd . for i in `seq 1 150` do date > foo mkdir aaaaaaaaaaaaaaaaaaaa cd aaaaaaaaaaaaaaaaaaaa done popd shar .>/dev/null Segmentation fault <<<< must not happen.
ping
Fixed.
9.2 is not affected? And where is the patchinfo?
Marcus, Andreas said you have some old patchinfos that can be used here?
(9.2 version is submitted)
packages appr4oved
CAN-2004-1772 I think
CVE-2004-1772: CVSS v2 Base Score: 4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P)