Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-1100

Опубликовано: 11 апр. 2018
Источник: ubuntu
Приоритет: low
CVSS2: 7.2
CVSS3: 7.8

Описание

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.

РелизСтатусПримечание
artful

ignored

end of life
bionic

released

5.4.2-3ubuntu3.1
devel

not-affected

5.5-1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [5.0.2-3ubuntu6.3]]
esm-infra/bionic

released

5.4.2-3ubuntu3.1
esm-infra/xenial

released

5.1.1-1ubuntu2.3
precise/esm

DNE

trusty

released

5.0.2-3ubuntu6.3
trusty/esm

DNE

trusty was released [5.0.2-3ubuntu6.3]
upstream

released

5.5-1

Показывать по

7.2 High

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
больше 7 лет назад

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.

CVSS3: 7.8
nvd
больше 7 лет назад

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.

CVSS3: 7.8
debian
больше 7 лет назад

zsh through version 5.4.2 is vulnerable to a stack-based buffer overfl ...

suse-cvrf
больше 7 лет назад

Security update for zsh

CVSS3: 7.8
github
больше 3 лет назад

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.

7.2 High

CVSS2

7.8 High

CVSS3