DEBIAN-CVE-2004-1773

Source
https://security-tracker.debian.org/tracker/CVE-2004-1773
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2004-1773.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2004-1773
Upstream
Published
2004-12-31T05:00:00Z
Modified
2025-09-24T23:51:12.572096Z
Summary
[none]
Details

Multiple buffer overflows in sharutils 4.2.1 and earlier may allow attackers to execute arbitrary code via (1) long output from wc to shar, or (2) unknown vectors in unshar.

References

Affected packages

Debian:11 / sharutils

Package

Name
sharutils
Purl
pkg:deb/debian/sharutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:4.2.1-12

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / sharutils

Package

Name
sharutils
Purl
pkg:deb/debian/sharutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:4.2.1-12

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / sharutils

Package

Name
sharutils
Purl
pkg:deb/debian/sharutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:4.2.1-12

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / sharutils

Package

Name
sharutils
Purl
pkg:deb/debian/sharutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:4.2.1-12

Ecosystem specific

{
    "urgency": "not yet assigned"
}