Description
Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1335-1 | zsh security update |
Debian DLA |
DLA-2470-1 | zsh security update |
EUVD |
EUVD-2018-11733 | Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation. |
Ubuntu USN |
USN-3608-1 | Zsh vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-09-16T18:13:29.080Z
Reserved: 2017-12-04T00:00:00.000Z
Link: CVE-2018-1083
No data.
Status : Modified
Published: 2018-03-28T13:29:00.213
Modified: 2024-11-21T03:59:08.633
Link: CVE-2018-1083
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN