Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1335-1 | zsh security update |
Debian DLA |
DLA-2470-1 | zsh security update |
EUVD |
EUVD-2018-11733 | Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation. |
Ubuntu USN |
USN-3608-1 | Zsh vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-09-16T18:13:29.080Z
Reserved: 2017-12-04T00:00:00
Link: CVE-2018-1083
No data.
Status : Modified
Published: 2018-03-28T13:29:00.213
Modified: 2024-11-21T03:59:08.633
Link: CVE-2018-1083
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN