Description
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2470-1 | zsh security update |
EUVD |
EUVD-2018-11748 | zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user. |
Ubuntu USN |
USN-3764-1 | Zsh vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T03:51:48.499Z
Reserved: 2017-12-04T00:00:00.000Z
Link: CVE-2018-1100
No data.
Status : Modified
Published: 2018-04-11T19:29:01.027
Modified: 2024-11-21T03:59:10.910
Link: CVE-2018-1100
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN