CVE-2018-1100
Summary
| CVE | CVE-2018-1100 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-04-11 19:29:00 UTC |
| Updated | 2023-11-07 02:55:00 UTC |
| Description | zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| USN-3764-1: Zsh vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| CVE-2018-1100 - Red Hat Customer Portal |
MISC |
access.redhat.com |
|
| [SECURITY] [DLA 2470-1] zsh security update |
MLIST |
lists.debian.org |
|
| Zsh: Multiple vulnerabilities (GLSA 201805-10) — Gentoo security |
GENTOO |
security.gentoo.org |
Third Party Advisory |
| 1563395 – (CVE-2018-1100) CVE-2018-1100 zsh: buffer overflow in utils.c:checkmailpath() can lead to local arbitrary code execution |
CONFIRM |
bugzilla.redhat.com |
Issue Tracking, Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| zsh / Code / Commit [31f722] |
CONFIRM |
sourceforge.net |
Patch |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 710220 Gentoo Linux Zsh Multiple Vulnerabilities (GLSA 201805-10)
- 751799 SUSE Enterprise Linux Security Update for zsh (SUSE-SU-2022:0733-1)