CVE-2025-9175

5.3 MEDIUM

📋 TL;DR

A stack-based buffer overflow vulnerability in neurobin shc up to version 4.0.3 allows local attackers to execute arbitrary code or cause denial of service. The vulnerability exists in the 'make' function of src/shc.c and requires local access to exploit. Users of shc versions up to 4.0.3 are affected.

💻 Affected Systems

Products:
  • neurobin shc
Versions: up to and including 4.0.3
Operating Systems: All platforms where shc is installed
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where shc is installed and accessible to local users. The vulnerability is in the shc compiler itself.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation leading to complete system compromise, arbitrary code execution as the user running shc, or denial of service.

🟠

Likely Case

Local user gains elevated privileges or crashes the shc process, potentially affecting dependent scripts or systems.

🟢

If Mitigated

Limited impact due to local-only exploitation and proper access controls restricting who can run shc.

🌐 Internet-Facing: LOW - The vulnerability requires local access and cannot be exploited remotely.
🏢 Internal Only: MEDIUM - Local users with access to shc could exploit this, but requires specific conditions and local privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit details are publicly available but require local access and understanding of buffer overflow techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 4.0.4 or later

Vendor Advisory: https://github.com/neurobin/shc/releases

Restart Required: No

Instructions:

1. Check current shc version with 'shc -v'. 2. Update shc using package manager or compile from source. 3. For source installation: git clone https://github.com/neurobin/shc.git, cd shc, ./configure, make, sudo make install.

🔧 Temporary Workarounds

Restrict shc execution

all

Limit which users can execute shc to reduce attack surface

sudo chmod 750 /usr/local/bin/shc
sudo chown root:trustedgroup /usr/local/bin/shc

Remove shc temporarily

all

Uninstall shc until patched if not critically needed

sudo apt remove shc
sudo yum remove shc
sudo make uninstall (from source install)

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can run shc
  • Monitor for unusual shc execution patterns or crashes

🔍 How to Verify

Check if Vulnerable:

Run 'shc -v' and check if version is 4.0.3 or earlier

Check Version:

shc -v

Verify Fix Applied:

After update, run 'shc -v' to confirm version is 4.0.4 or later

📡 Detection & Monitoring

Log Indicators:

  • Multiple shc process crashes
  • Unusual shc execution by non-privileged users
  • Segmentation faults in shc processes

Network Indicators:

  • None - local-only vulnerability

SIEM Query:

process.name="shc" AND (event.action="segmentation_fault" OR event.action="crash")

🔗 References

📤 Share & Export