7.5
CVSSv2

CVE-2018-0502

Published: 05/09/2018 Updated: 01/12/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

An issue exists in zsh prior to 5.6. The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named on the second line.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

canonical ubuntu linux 16.04

canonical ubuntu linux 14.04

canonical ubuntu linux 18.04

zsh zsh

Vendor Advisories

Debian Bug report logs - #908000 zsh: CVE-2018-0502 + CVE-2018-13259: Two security bugs in shebang line parsing Package: zsh; Maintainer for zsh is Debian Zsh Maintainers <pkg-zsh-devel@listsaliothdebianorg>; Source for zsh is src:zsh (PTS, buildd, popcon) Reported by: Axel Beckert <abe@debianorg> Date: Wed, 5 S ...
Zsh could be made to execute arbitrary code if it received a specially crafted script ...
An issue was discovered in zsh before 56 The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named on the second line(CVE-2018-0502) It was discovered that zsh does not properly validate the shebang of input files and it truncates it to the first 64 bytes A local attacker may use this flaw to mak ...
An issue was discovered in zsh before 56 The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named on the second line ...
An issue was discovered in zsh before 56 The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named on the second line ...