Zsh 4.1.0 dev-5

CPE Details

Zsh 4.1.0 dev-5
4.1.0
2019-06-11
13h50 +00:00
2019-06-11
13h50 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:zsh:zsh:4.1.0:dev-5:*:*:*:*:*:*

Informations

Vendor

zsh

Product

zsh

Version

4.1.0

Update

dev-5

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2021-45444 2022-02-13
04h32 +00:00
In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
7.8
High
CVE-2019-20044 2020-02-24
12h09 +00:00
In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().
7.8
High
CVE-2018-0502 2018-09-05
05h00 +00:00
An issue was discovered in zsh before 5.6. The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named on the second line.
9.8
Critical
CVE-2018-13259 2018-09-05
05h00 +00:00
An issue was discovered in zsh before 5.6. Shebang lines exceeding 64 characters were truncated, potentially leading to an execve call to a program name that is a substring of the intended one.
9.8
Critical
CVE-2018-1100 2018-04-11
19h00 +00:00
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.
7.8
High
CVE-2018-1083 2018-03-28
13h00 +00:00
Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation.
7.8
High
CVE-2018-1071 2018-03-09
15h00 +00:00
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.
5.5
Medium
CVE-2014-10071 2018-02-27
21h00 +00:00
In exec.c in zsh before 5.0.7, there is a buffer overflow for very long fds in the ">& fd" syntax.
9.8
Critical
CVE-2016-10714 2018-02-27
21h00 +00:00
In zsh before 5.3, an off-by-one error resulted in undersized buffers that were intended to support PATH_MAX characters.
9.8
Critical
CVE-2017-18206 2018-02-27
21h00 +00:00
In utils.c in zsh before 5.4, symlink expansion had a buffer overflow.
9.8
Critical
CVE-2018-7548 2018-02-27
21h00 +00:00
In subst.c in zsh through 5.4.2, there is a NULL pointer dereference when using ${(PA)...} on an empty array result.
9.8
Critical
CVE-2018-7549 2018-02-27
21h00 +00:00
In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, as demonstrated by typeset -p.
7.5
High