CVE-2014-10070
Publication date 27 February 2018
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
zsh before 5.0.7 allows evaluation of the initial values of integer variables imported from the environment (instead of treating them as literal numbers). That could allow local privilege escalation, under some specific and atypical conditions where zsh is being invoked in privilege-elevation contexts when the environment has not been properly sanitized, such as when zsh is invoked by sudo on systems where "env_reset" has been disabled.
Status
Package | Ubuntu Release | Status |
---|---|---|
zsh | ||
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Fixed 5.0.2-3ubuntu6.1
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 · High |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3593-1
- Zsh vulnerabilities
- 8 March 2018