First published: Wed Sep 05 2018(Updated: )
An issue was discovered in zsh before 5.6. The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named on the second line.
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Zsh Zsh | <5.6 | |
debian/zsh | 5.8-6+deb11u1 5.9-4 5.9-8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-0502 is critical, with a CVSS score of 9.8.
CVE-2018-0502 affects zsh versions before 5.6.
Yes, CVE-2018-0502 can potentially lead to arbitrary code execution.
CVE-2018-0502 affects Canonical Ubuntu Linux versions 14.04, 16.04, and 18.04.
To fix CVE-2018-0502, upgrade zsh to version 5.6 or higher.