Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1100

Опубликовано: 11 апр. 2018
Источник: debian
EPSS Низкий

Описание

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
zshfixed5.5-1package
zshno-dsajessiepackage
zshno-dsawheezypackage

Примечания

  • https://www.zsh.org/cgi-bin/mla/redirect?WORKERNUMBER=42607

  • https://sourceforge.net/p/zsh/code/ci/31f72205630687c1cef89347863aab355296a27f/

EPSS

Процентиль: 33%
0.00127
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 7 лет назад

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.

CVSS3: 7.5
redhat
больше 7 лет назад

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.

CVSS3: 7.8
nvd
больше 7 лет назад

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.

suse-cvrf
больше 7 лет назад

Security update for zsh

CVSS3: 7.8
github
больше 3 лет назад

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.

EPSS

Процентиль: 33%
0.00127
Низкий