Описание
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | released | 5.4.2-3ubuntu3.1 |
| devel | not-affected | 5.5-1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [5.0.2-3ubuntu6.3]] |
| esm-infra/bionic | released | 5.4.2-3ubuntu3.1 |
| esm-infra/xenial | released | 5.1.1-1ubuntu2.3 |
| precise/esm | DNE | |
| trusty | released | 5.0.2-3ubuntu6.3 |
| trusty/esm | DNE | trusty was released [5.0.2-3ubuntu6.3] |
| upstream | released | 5.5-1 |
Показывать по
7.2 High
CVSS2
7.8 High
CVSS3
Связанные уязвимости
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.
zsh through version 5.4.2 is vulnerable to a stack-based buffer overfl ...
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.
7.2 High
CVSS2
7.8 High
CVSS3