RSS   Vulnerabilities for 'ZSH'   RSS

2022-02-14
 
CVE-2021-45444

NVD-CWE-noinfo
 

 
In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.

 
2018-09-05
 
CVE-2018-13259

CWE-20
 

 
An issue was discovered in zsh before 5.6. Shebang lines exceeding 64 characters were truncated, potentially leading to an execve call to a program name that is a substring of the intended one.

 
2018-04-11
 
CVE-2018-1100

CWE-119
 

 
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.

 
2018-03-28
 
CVE-2018-1083

CWE-119
 

 
Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation.

 
2018-03-09
 
CVE-2018-1071

CWE-119
 

 
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.

 
2018-02-27
 
CVE-2018-7549

CWE-20
 

 
In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, as demonstrated by typeset -p.

 
 
CVE-2018-7548

CWE-476
 

 
In subst.c in zsh through 5.4.2, there is a NULL pointer dereference when using ${(PA)...} on an empty array result.

 
 
CVE-2014-10071

CWE-119
 

 
In exec.c in zsh before 5.0.7, there is a buffer overflow for very long fds in the ">& fd" syntax.

 
2007-12-03
 
CVE-2007-6209

CWE-264
 

 
Util/difflog.pl in zsh 4.3.4 allows local users to overwrite arbitrary files via a symlink attack on temporary files.

 


Copyright 2024, cxsecurity.com

 

Back to Top