Vulnerability Details : CVE-2018-0502
An issue was discovered in zsh before 5.6. The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named on the second line.
Vulnerability category: Input validation
Products affected by CVE-2018-0502
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
- cpe:2.3:a:zsh:zsh:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-0502
0.87%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 82 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-0502
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2018-0502
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-0502
-
https://bugs.debian.org/908000
#908000 - zsh: CVE-2018-0502 + CVE-2018-13259: Two security bugs in shebang line parsing - Debian Bug report logsMailing List;Patch;Third Party Advisory
-
https://security.gentoo.org/glsa/201903-02
Zsh: User-assisted execution of arbitrary code (GLSA 201903-02) — Gentoo securityThird Party Advisory
-
https://www.zsh.org/mla/zsh-announce/136
Mailing List;Vendor Advisory
-
https://lists.debian.org/debian-lts-announce/2020/12/msg00000.html
[SECURITY] [DLA 2470-1] zsh security update
-
https://sourceforge.net/p/zsh/code/ci/1c4c7b6a4d17294df028322b70c53803a402233d
zsh / Code / Commit [1c4c7b]Patch;Third Party Advisory
-
https://usn.ubuntu.com/3764-1/
USN-3764-1: Zsh vulnerabilities | Ubuntu security noticesThird Party Advisory
Jump to