Описание
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | released | 5.2-5ubuntu1.2 |
| devel | released | 5.4.2-3ubuntu3 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [5.0.2-3ubuntu6.2]] |
| esm-infra/xenial | released | 5.1.1-1ubuntu2.2 |
| precise/esm | DNE | |
| trusty | released | 5.0.2-3ubuntu6.2 |
| trusty/esm | DNE | trusty was released [5.0.2-3ubuntu6.2] |
| upstream | needs-triage | |
| xenial | released | 5.1.1-1ubuntu2.2 |
Показывать по
EPSS
2.1 Low
CVSS2
5.5 Medium
CVSS3
Связанные уязвимости
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.
zsh through version 5.4.2 is vulnerable to a stack-based buffer overfl ...
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.
Уязвимость функции exec.c:hashcmd() командной оболочки UNIX Zsh, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
2.1 Low
CVSS2
5.5 Medium
CVSS3