Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-1335-1 | zsh security update |
![]() |
DLA-2470-1 | zsh security update |
![]() |
EUVD-2018-11733 | Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation. |
![]() |
USN-3608-1 | Zsh vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-09-16T18:13:29.080Z
Reserved: 2017-12-04T00:00:00
Link: CVE-2018-1083

No data.

Status : Modified
Published: 2018-03-28T13:29:00.213
Modified: 2024-11-21T03:59:08.633
Link: CVE-2018-1083


No data.