Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-1100

Опубликовано: 07 апр. 2018
Источник: redhat
CVSS3: 7.5

Описание

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.

A buffer overflow flaw was found in the zsh shell check path functionality. A local, unprivileged user can create a specially crafted message file, which, if used to set a custom "you have new mail" message, leads to code execution in the context of the user who receives the message. If the user affected is privileged, this leads to privilege escalation.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5zshWill not fix
Red Hat Enterprise Linux 8zshNot affected
Red Hat Enterprise Linux 6zshFixedRHSA-2018:193219.06.2018
Red Hat Enterprise Linux 7zshFixedRHSA-2018:307330.10.2018

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-120->CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=1563395zsh: buffer overflow in utils.c:checkmailpath() can lead to local arbitrary code execution

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 7 лет назад

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.

CVSS3: 7.8
nvd
больше 7 лет назад

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.

CVSS3: 7.8
debian
больше 7 лет назад

zsh through version 5.4.2 is vulnerable to a stack-based buffer overfl ...

suse-cvrf
больше 7 лет назад

Security update for zsh

CVSS3: 7.8
github
больше 3 лет назад

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.

7.5 High

CVSS3