Stack-based buffer overflow in zsh (Alpine package)



Published: 2018-03-31
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2018-1071
CWE-ID CWE-121
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
zsh (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Stack-based buffer overflow

EUVDB-ID: #VU12187

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-1071

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a local attacker to cause DOS condition on the target system.

The weakness exists in the exec.c:hashcmd() function due to stack-based buffer overflow. A local attacker can trigger memory corruption and cause the service to crash.

Mitigation

Install update from vendor's website.

Vulnerable software versions

zsh (Alpine package): 5.2-r1

External links

http://git.alpinelinux.org/aports/commit/?id=3a8ed482dcd4247f15f313716e73ffff476ff2ca
http://git.alpinelinux.org/aports/commit/?id=af2c3849211f5b0c24e2554e5b9ee07a4ad66d03
http://git.alpinelinux.org/aports/commit/?id=ed5980a756a61aff37036538eb476cd7920fd95f
http://git.alpinelinux.org/aports/commit/?id=6c6b294b3615b7956885de09d3d094dad970b4a4
http://git.alpinelinux.org/aports/commit/?id=baffcd5dd15fe505bf73fb6e16d5161eaea18da6
http://git.alpinelinux.org/aports/commit/?id=8c0f8e44496c04f7f0f64b71170163e7e66717b4
http://git.alpinelinux.org/aports/commit/?id=9c28202eac2457a216aee765ce009c610f216e8c


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###