Unrated severityNVD Advisory· Published Apr 11, 2018· Updated Aug 5, 2024
CVE-2018-1100
CVE-2018-1100
Description
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- access.redhat.com/errata/RHSA-2018:1932mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:3073mitrevendor-advisoryx_refsource_REDHAT
- security.gentoo.org/glsa/201805-10mitrevendor-advisoryx_refsource_GENTOO
- usn.ubuntu.com/3764-1/mitrevendor-advisoryx_refsource_UBUNTU
- bugzilla.redhat.com/show_bug.cgimitrex_refsource_CONFIRM
- lists.debian.org/debian-lts-announce/2020/12/msg00000.htmlmitremailing-listx_refsource_MLIST
- sourceforge.net/p/zsh/code/ci/31f72205630687c1cef89347863aab355296a27f/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.