Vulnerability Description
Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zsh | Zsh | <= 5.4.1 |
| Canonical | Ubuntu Linux | 14.04 |
| Debian | Debian Linux | 7.0 |
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Workstation | 6.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/103572Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:1932Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:3073Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1557382Issue TrackingThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/03/msg00038.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/12/msg00000.html
- https://security.gentoo.org/glsa/201805-10Third Party Advisory
- https://sourceforge.net/p/zsh/code/ci/259ac472eac291c8c103c7a0d8a4eaf3c2942ed7PatchThird Party Advisory
- https://usn.ubuntu.com/3608-1/Third Party Advisory
- http://www.securityfocus.com/bid/103572Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:1932Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:3073Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1557382Issue TrackingThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/03/msg00038.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/12/msg00000.html
FAQ
What is CVE-2018-1083?
CVE-2018-1083 is a vulnerability with a CVSS score of 7.8 (HIGH). Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code ...
How severe is CVE-2018-1083?
CVE-2018-1083 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-1083?
Check the references section above for vendor advisories and patch information. Affected products include: Zsh Zsh, Canonical Ubuntu Linux, Debian Debian Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server.