Stack-based Buffer Overflow in GNU Sharutils Affects Local Users
CVE-2004-1772
Currently unrated
Summary
A stack-based buffer overflow vulnerability in GNU Sharutils version 4.2.1 allows local users to exploit the application by supplying overly long command line arguments to the '-o' option, potentially leading to arbitrary code execution. This flaw places affected systems at risk, enabling unauthorized actions to be carried out by malicious actors leveraging this exploit.
References
Timeline
Vulnerability Reserved
Vulnerability published