Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2014-10070

Опубликовано: 27 фев. 2018
Источник: nvd
CVSS3: 7.8
CVSS2: 4.6
EPSS Низкий

Описание

zsh before 5.0.7 allows evaluation of the initial values of integer variables imported from the environment (instead of treating them as literal numbers). That could allow local privilege escalation, under some specific and atypical conditions where zsh is being invoked in privilege-elevation contexts when the environment has not been properly sanitized, such as when zsh is invoked by sudo on systems where "env_reset" has been disabled.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:zsh_project:zsh:*:*:*:*:*:*:*:*
Версия до 5.0.6 (включая)

EPSS

Процентиль: 36%
0.0015
Низкий

7.8 High

CVSS3

4.6 Medium

CVSS2

Дефекты

CWE-264

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 8 лет назад

zsh before 5.0.7 allows evaluation of the initial values of integer variables imported from the environment (instead of treating them as literal numbers). That could allow local privilege escalation, under some specific and atypical conditions where zsh is being invoked in privilege-elevation contexts when the environment has not been properly sanitized, such as when zsh is invoked by sudo on systems where "env_reset" has been disabled.

redhat
почти 8 лет назад

zsh before 5.0.7 allows evaluation of the initial values of integer variables imported from the environment (instead of treating them as literal numbers). That could allow local privilege escalation, under some specific and atypical conditions where zsh is being invoked in privilege-elevation contexts when the environment has not been properly sanitized, such as when zsh is invoked by sudo on systems where "env_reset" has been disabled.

CVSS3: 7.8
debian
почти 8 лет назад

zsh before 5.0.7 allows evaluation of the initial values of integer va ...

CVSS3: 7.8
github
больше 3 лет назад

zsh before 5.0.7 allows evaluation of the initial values of integer variables imported from the environment (instead of treating them as literal numbers). That could allow local privilege escalation, under some specific and atypical conditions where zsh is being invoked in privilege-elevation contexts when the environment has not been properly sanitized, such as when zsh is invoked by sudo on systems where "env_reset" has been disabled.

suse-cvrf
почти 8 лет назад

Security update for zsh

EPSS

Процентиль: 36%
0.0015
Низкий

7.8 High

CVSS3

4.6 Medium

CVSS2

Дефекты

CWE-264