CVE-2018-1071

Name
CVE-2018-1071
Description
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=1553531
Third Party Advisory http://www.securityfocus.com/bid/103359
Third Party Advisory https://usn.ubuntu.com/3608-1/
Mailing List https://lists.debian.org/debian-lts-announce/2018/03/msg00038.html
Third Party Advisory https://security.gentoo.org/glsa/201805-10
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:3073
MLIST https://lists.debian.org/debian-lts-announce/2020/12/msg00000.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:zsh:zsh:*:*:*:*:*:*:*:* zsh >= None <= 5.4.2

Vulnerable and fixed packages

Source package Branch Version Maintainer Status