cpe:/a:gnu:sharutils:4.15.2 cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~ cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~ cpe:/o:canonical:ubuntu_linux:17.10 cpe:/o:debian:debian_linux:8.0 cpe:/o:debian:debian_linux:9.0 CVE-2018-1000097 2018-03-12T21:29:00.967-04:00 2018-04-13T10:50:02.647-04:00 6.8 NETWORK MEDIUM NONE PARTIAL PARTIAL PARTIAL http://nvd.nist.gov 2018-04-11T11:57:45.987-04:00 BUGTRAQ 20180221 Sharutils 4.15.2 Heap-Buffer-Overflow DEBIAN DSA-4167 UBUNTU USN-3605-1 Sharutils sharutils (unshar command) version 4.15.2 contains a Buffer Overflow vulnerability in Affected component on the file unshar.c at line 75, function looks_like_c_code. Failure to perform checking of the buffer containing input line. that can result in Could lead to code execution. This attack appear to be exploitable via Victim have to run unshar command on a specially crafted file..