Vulnerability CVE-2018-1100


Published: 2018-04-11

Description:
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
ZSH -> ZSH 
Redhat -> Enterprise linux desktop 
Redhat -> Enterprise linux server 
Redhat -> Enterprise linux workstation 
Canonical -> Ubuntu linux 

 References:
https://access.redhat.com/errata/RHSA-2018:1932
https://access.redhat.com/errata/RHSA-2018:3073
https://bugzilla.redhat.com/show_bug.cgi?id=1563395
https://security.gentoo.org/glsa/201805-10
https://sourceforge.net/p/zsh/code/ci/31f72205630687c1cef89347863aab355296a27f/
https://usn.ubuntu.com/3764-1/

Copyright 2024, cxsecurity.com

 

Back to Top