First published: Tue Apr 03 2018(Updated: )
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Zsh | <=5.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1563395 is classified as a critical vulnerability due to its potential for arbitrary code execution.
To fix REDHAT-BUG-1563395, you should update Zsh to version 5.4.3 or later.
Users of Zsh versions up to and including 5.4.2 are affected by REDHAT-BUG-1563395.
REDHAT-BUG-1563395 is a stack-based buffer overflow vulnerability.
No, REDHAT-BUG-1563395 requires local access to exploit the vulnerability.