CVE-2014-10070

zsh before 5.0.7 allows evaluation of the initial values of integer variables imported from the environment (instead of treating them as literal numbers). That could allow local privilege escalation, under some specific and atypical conditions where zsh is being invoked in privilege-elevation contexts when the environment has not been properly sanitized, such as when zsh is invoked by sudo on systems where "env_reset" has been disabled.
Configurations

Configuration 1 (hide)

cpe:2.3:a:zsh_project:zsh:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:03

Type Values Removed Values Added
References () http://zsh.sourceforge.net/releases.html - Release Notes, Third Party Advisory () http://zsh.sourceforge.net/releases.html - Release Notes, Third Party Advisory
References () https://sourceforge.net/p/zsh/code/ci/546203a770cec329e73781c3c8ab1078390aee72 - Patch, Third Party Advisory () https://sourceforge.net/p/zsh/code/ci/546203a770cec329e73781c3c8ab1078390aee72 - Patch, Third Party Advisory
References () https://usn.ubuntu.com/3593-1/ - () https://usn.ubuntu.com/3593-1/ -

Information

Published : 2018-02-27 22:29

Updated : 2024-11-21 02:03


NVD link : CVE-2014-10070

Mitre link : CVE-2014-10070

CVE.ORG link : CVE-2014-10070


JSON object : View

Products Affected

zsh_project

  • zsh
CWE
CWE-264

Permissions, Privileges, and Access Controls