Summary
Detail | |||
---|---|---|---|
Vendor | Zsh | First view | 2018-02-27 |
Product | Zsh | Last view | 2022-02-14 |
Version | 4.3.8 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:zsh:zsh |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2022-02-14 | CVE-2021-45444 | In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion. |
7.8 | 2020-02-24 | CVE-2019-20044 | In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid(). |
9.8 | 2018-09-05 | CVE-2018-13259 | An issue was discovered in zsh before 5.6. Shebang lines exceeding 64 characters were truncated, potentially leading to an execve call to a program name that is a substring of the intended one. |
9.8 | 2018-09-05 | CVE-2018-0502 | An issue was discovered in zsh before 5.6. The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named on the second line. |
7.8 | 2018-04-11 | CVE-2018-1100 | zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user. |
7.8 | 2018-03-28 | CVE-2018-1083 | Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation. |
5.5 | 2018-03-09 | CVE-2018-1071 | zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service. |
7.5 | 2018-02-27 | CVE-2018-7549 | In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, as demonstrated by typeset -p. |
9.8 | 2018-02-27 | CVE-2018-7548 | In subst.c in zsh through 5.4.2, there is a NULL pointer dereference when using ${(PA)...} on an empty array result. |
9.8 | 2018-02-27 | CVE-2017-18206 | In utils.c in zsh before 5.4, symlink expansion had a buffer overflow. |
9.8 | 2018-02-27 | CVE-2016-10714 | In zsh before 5.3, an off-by-one error resulted in undersized buffers that were intended to support PATH_MAX characters. |
9.8 | 2018-02-27 | CVE-2014-10071 | In exec.c in zsh before 5.0.7, there is a buffer overflow for very long fds in the ">& fd" syntax. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
27% (3) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
27% (3) | CWE-20 | Improper Input Validation |
9% (1) | CWE-476 | NULL Pointer Dereference |
9% (1) | CWE-273 | Improper Check for Dropped Privileges |
9% (1) | CWE-189 | Numeric Errors |
9% (1) | CWE-121 | Stack-based Buffer Overflow |
9% (1) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-14 | Name: The remote Slackware host is missing a security update. File: Slackware_SSA_2019-013-01.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-d2dcdbb051.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-a5e9a619f6.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-5ad8e216d2.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-16bb8b00c5.nasl - Type: ACT_GATHER_INFO |
2018-12-28 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1424.nasl - Type: ACT_GATHER_INFO |
2018-12-10 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1396.nasl - Type: ACT_GATHER_INFO |
2018-12-07 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1107.nasl - Type: ACT_GATHER_INFO |
2018-11-16 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-3073.nasl - Type: ACT_GATHER_INFO |
2018-10-11 | Name: The remote Amazon Linux 2 host is missing a security update. File: al2_ALAS-2018-1089.nasl - Type: ACT_GATHER_INFO |
2018-09-17 | Name: The remote Fedora host is missing a security update. File: fedora_2018-8b1b2373b4.nasl - Type: ACT_GATHER_INFO |
2018-07-24 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0037.nasl - Type: ACT_GATHER_INFO |
2018-07-24 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0050.nasl - Type: ACT_GATHER_INFO |
2018-07-24 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0039.nasl - Type: ACT_GATHER_INFO |
2018-07-24 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0028.nasl - Type: ACT_GATHER_INFO |
2018-07-03 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1209.nasl - Type: ACT_GATHER_INFO |
2018-07-03 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1208.nasl - Type: ACT_GATHER_INFO |
2018-06-22 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-1932.nasl - Type: ACT_GATHER_INFO |
2018-05-29 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201805-10.nasl - Type: ACT_GATHER_INFO |
2018-05-11 | Name: The remote Amazon Linux 2 host is missing a security update. File: al2_ALAS-2018-1013.nasl - Type: ACT_GATHER_INFO |
2018-05-07 | Name: The remote Fedora host is missing a security update. File: fedora_2018-ac1d9c2777.nasl - Type: ACT_GATHER_INFO |
2018-05-02 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1091.nasl - Type: ACT_GATHER_INFO |
2018-05-02 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1090.nasl - Type: ACT_GATHER_INFO |
2018-04-18 | Name: The remote Amazon Linux 2 host is missing a security update. File: al2_ALAS-2018-986.nasl - Type: ACT_GATHER_INFO |
2018-04-02 | Name: The remote Debian host is missing a security update. File: debian_DLA-1335.nasl - Type: ACT_GATHER_INFO |