CVE-2019-20044
24.02.2020, 14:15
In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().Enginsight
Vendor | Product | Version |
---|---|---|
zsh | zsh | 𝑥 < 5.8 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
apple | ipados | 𝑥 < 13.5 |
apple | iphone_os | 𝑥 < 13.5 |
apple | mac_os_x | 𝑥 < 10.15.5 |
apple | mac_os_x | 10.13.0 ≤ 𝑥 < 10.13.6 |
apple | mac_os_x | 10.14.0 ≤ 𝑥 < 10.14.6 |
apple | mac_os_x | 10.15 ≤ 𝑥 < 10.15.5 |
apple | mac_os_x | 10.13.6 |
apple | mac_os_x | 10.13.6:security_update_2018-002 |
apple | mac_os_x | 10.13.6:security_update_2018-003 |
apple | mac_os_x | 10.13.6:security_update_2019-001 |
apple | mac_os_x | 10.13.6:security_update_2019-002 |
apple | mac_os_x | 10.13.6:security_update_2019-003 |
apple | mac_os_x | 10.13.6:security_update_2019-004 |
apple | mac_os_x | 10.13.6:security_update_2019-005 |
apple | mac_os_x | 10.13.6:security_update_2019-006 |
apple | mac_os_x | 10.13.6:security_update_2019-007 |
apple | mac_os_x | 10.13.6:security_update_2020-001 |
apple | mac_os_x | 10.13.6:security_update_2020-002 |
apple | mac_os_x | 10.14.6 |
apple | mac_os_x | 10.14.6:security_update_2019-001 |
apple | mac_os_x | 10.14.6:security_update_2019-002 |
apple | mac_os_x | 10.14.6:security_update_2019-004 |
apple | mac_os_x | 10.14.6:security_update_2019-005 |
apple | mac_os_x | 10.14.6:security_update_2019-006 |
apple | mac_os_x | 10.14.6:security_update_2019-007 |
apple | mac_os_x | 10.14.6:security_update_2020-001 |
apple | mac_os_x | 10.14.6:security_update_2020-002 |
apple | tvos | 𝑥 < 13.4.5 |
apple | watchos | 𝑥 < 6.2.5 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References