CVE-2018-1071Stack-based Buffer Overflow in ZSH

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 88.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 9
Latest updateMay 13

Description

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages8 packages

debiandebian/zsh< zsh 5.4.2-4 (bookworm)
Debianzsh/zsh< 5.4.2-4+3
Ubuntuzsh/zsh< 5.0.2-3ubuntu6.2+1
NVDzsh/zsh5.4.2
CVEListV5zsh/zsh5.4.2

Also affects: Debian Linux 7.0, Ubuntu Linux 14.04, 16.04, 17.10

🔴Vulnerability Details

3
GHSA
GHSA-xc49-qj7m-vpp4: zsh through version 52022-05-13
OSV
zsh vulnerabilities2018-03-27
OSV
CVE-2018-1071: zsh through version 52018-03-09

📋Vendor Advisories

3
Ubuntu
Zsh vulnerabilities2018-03-27
Red Hat
zsh: Stack-based buffer overflow in exec.c:hashcmd()2018-03-09
Debian
CVE-2018-1071: zsh - zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the ...2018

💬Community

3
Bugzilla
CVE-2018-1999046 jenkins: Unauthorized users could access agent logs2018-08-23
Bugzilla
CVE-2018-1071 zsh: Stack-based buffer overflow in exec.c:hashcmd() [fedora-all]2018-03-09
Bugzilla
CVE-2018-1071 zsh: Stack-based buffer overflow in exec.c:hashcmd()2018-03-09