7.8

CVE-2019-20044

In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().

Data is provided by the National Vulnerability Database (NVD)
ZshZsh Version < 5.8
   ApplemacOS Version-
   LinuxLinux Kernel Version-
FedoraprojectFedora Version30
FedoraprojectFedora Version31
DebianDebian Linux Version8.0
DebianDebian Linux Version9.0
AppleiPadOS Version < 13.5
AppleiPhone OS Version < 13.5
ApplemacOS X Version < 10.15.5
ApplemacOS X Version >= 10.13.0 < 10.13.6
ApplemacOS X Version >= 10.14.0 < 10.14.6
ApplemacOS X Version >= 10.15 < 10.15.5
ApplemacOS X Version10.13.6 Update-
ApplemacOS X Version10.13.6 Updatesecurity_update_2018-002
ApplemacOS X Version10.13.6 Updatesecurity_update_2018-003
ApplemacOS X Version10.13.6 Updatesecurity_update_2019-001
ApplemacOS X Version10.13.6 Updatesecurity_update_2019-002
ApplemacOS X Version10.13.6 Updatesecurity_update_2019-003
ApplemacOS X Version10.13.6 Updatesecurity_update_2019-004
ApplemacOS X Version10.13.6 Updatesecurity_update_2019-005
ApplemacOS X Version10.13.6 Updatesecurity_update_2019-006
ApplemacOS X Version10.13.6 Updatesecurity_update_2019-007
ApplemacOS X Version10.13.6 Updatesecurity_update_2020-001
ApplemacOS X Version10.13.6 Updatesecurity_update_2020-002
ApplemacOS X Version10.14.6 Update-
ApplemacOS X Version10.14.6 Updatesecurity_update_2019-001
ApplemacOS X Version10.14.6 Updatesecurity_update_2019-002
ApplemacOS X Version10.14.6 Updatesecurity_update_2019-004
ApplemacOS X Version10.14.6 Updatesecurity_update_2019-005
ApplemacOS X Version10.14.6 Updatesecurity_update_2019-006
ApplemacOS X Version10.14.6 Updatesecurity_update_2019-007
ApplemacOS X Version10.14.6 Updatesecurity_update_2020-001
ApplemacOS X Version10.14.6 Updatesecurity_update_2020-002
AppletvOS Version < 13.4.5
ApplewatchOS Version < 6.2.5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.09% 0.266
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE-273 Improper Check for Dropped Privileges

The product attempts to drop privileges but does not check or incorrectly checks to see if the drop succeeded.

http://zsh.sourceforge.net/releases.html
Third Party Advisory
Release Notes
http://seclists.org/fulldisclosure/2020/May/49
Third Party Advisory
Mailing List
http://seclists.org/fulldisclosure/2020/May/53
Third Party Advisory
Mailing List
http://seclists.org/fulldisclosure/2020/May/55
Third Party Advisory
Mailing List
http://seclists.org/fulldisclosure/2020/May/59
Third Party Advisory
Mailing List
https://www.zsh.org/mla/zsh-announce/141
Vendor Advisory
Release Notes