9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
Package : zsh
Version : 4.3.17-1+deb7u1
CVE IDs : CVE-2014-10070 CVE-2014-10071 CVE-2014-10072
CVE-2016-10714 CVE-2017-18206
It was discovered that there were multiple vulnerabilities in the
"zsh" shell:
CVE-2014-10070: Fix a privilege-elevation issue if the
environment has not been properly sanitized.
CVE-2014-10071: Prevent a buffer overflow for very long file
descriptors in the ">& fd" syntax.
CVE-2014-10072: Correct a buffer overflow when scanning very long
directory paths for symbolic links.
CVE-2016-10714: Fix an off-by-one error that was resulting in
undersized buffers that were intended to support PATH_MAX.
CVE-2017-18206: Fix a buffer overflow in symlink expansion.
For Debian 7 "Wheezy", this issue has been fixed in zsh version
4.3.17-1+deb7u1.
We recommend that you upgrade your zsh packages.
Regards,
,''`.
: :' : Chris Lamb
`. `'` [email protected] / chris-lamb.co.uk
`-
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | all | zsh | < 4.3.17-1+deb7u1 | zsh_4.3.17-1+deb7u1_all.deb |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P