Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2018-1071 |
CWE-ID | CWE-121 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
zsh (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU12187
Risk: Low
CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-1071
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to cause DOS condition on the target system.
The weakness exists in the exec.c:hashcmd() function due to stack-based buffer overflow. A local attacker can trigger memory corruption and cause the service to crash.
Install update from vendor's website.
Vulnerable software versionszsh (Alpine package): 5.2-r1
External linkshttp://git.alpinelinux.org/aports/commit/?id=3a8ed482dcd4247f15f313716e73ffff476ff2ca
http://git.alpinelinux.org/aports/commit/?id=af2c3849211f5b0c24e2554e5b9ee07a4ad66d03
http://git.alpinelinux.org/aports/commit/?id=ed5980a756a61aff37036538eb476cd7920fd95f
http://git.alpinelinux.org/aports/commit/?id=6c6b294b3615b7956885de09d3d094dad970b4a4
http://git.alpinelinux.org/aports/commit/?id=baffcd5dd15fe505bf73fb6e16d5161eaea18da6
http://git.alpinelinux.org/aports/commit/?id=8c0f8e44496c04f7f0f64b71170163e7e66717b4
http://git.alpinelinux.org/aports/commit/?id=9c28202eac2457a216aee765ce009c610f216e8c
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.