9.8
CVSSv3

CVE-2014-10071

Published: 27/02/2018 Updated: 11/06/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

In exec.c in zsh prior to 5.0.7, there is a buffer overflow for very long fds in the ">& fd" syntax.

Vulnerable Product Search on Vulmon Subscribe to Product

zsh zsh

canonical ubuntu linux 17.10

canonical ubuntu linux 14.04

canonical ubuntu linux 16.04

Vendor Advisories

Synopsis Moderate: zsh security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for zsh is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base score ...
Several security issues were fixed in Zsh ...
A buffer overflow flaw was found in the zsh shell symbolic link resolver A local, unprivileged user can create a specially crafted directory path which leads to a buffer overflow in the context of the user trying to do a symbolic link resolution in the aforementioned path If the user affected is privileged, this leads to privilege escalation(CVE ...
A buffer overflow flaw was found in the zsh shell file descriptor redirection functionality An attacker could use this flaw to cause a denial of service by crashing the user shell ...