CVE-2018-1100Classic Buffer Overflow in ZSH

Severity
7.8HIGHNVD
OSV9.8
EPSS
0.1%
top 79.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 11
Latest updateMay 13

Description

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages8 packages

debiandebian/zsh< zsh 5.5-1 (bookworm)
Debianzsh/zsh< 5.5-1+3
Ubuntuzsh/zsh< 5.0.2-3ubuntu6.3+2
NVDzsh/zsh5.4.2
CVEListV5zsh/zshthrough 5.4.2

Also affects: Ubuntu Linux 14.04, 16.04, 18.04

Patches

🔴Vulnerability Details

3
GHSA
GHSA-hwhr-jcvf-mgf3: zsh through version 52022-05-13
OSV
zsh vulnerabilities2018-09-11
OSV
CVE-2018-1100: zsh through version 52018-04-11

📋Vendor Advisories

3
Ubuntu
Zsh vulnerabilities2018-09-11
Red Hat
zsh: buffer overflow in utils.c:checkmailpath() can lead to local arbitrary code execution2018-04-07
Debian
CVE-2018-1100: zsh - zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the ...2018

💬Community

2
Bugzilla
CVE-2018-1100 zsh: buffer overflow in utils.c:checkmailpath() can lead to local arbitrary code execution2018-04-03
Bugzilla
CVE-2018-1100 zsh: buffer overflow in utils.c:checkmailpath() can lead to local arbitrary code execution [fedora-all]2018-04-03