CVE-2019-20044
HIGH | Platform: macOS | Changelog
CVE Details
Description
In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the –no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().
CVSS 3.1 Score
| Metric | Value |
|---|---|
| Base Score | 7.8 (HIGH) |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Weakness
References
- Apple Security Advisory
- NVD Entry
- http://seclists.org/fulldisclosure/2020/May/49 (Mailing List, Third Party Advisory)
- http://seclists.org/fulldisclosure/2020/May/53 (Mailing List, Third Party Advisory)
- http://seclists.org/fulldisclosure/2020/May/55 (Mailing List, Third Party Advisory)
- http://seclists.org/fulldisclosure/2020/May/59 (Mailing List, Third Party Advisory)
- http://zsh.sourceforge.net/releases.html (Release Notes, Third Party Advisory)
- https://github.com/XMB5/zsh-privileged-upgrade (Broken Link)
- https://lists.debian.org/debian-lts-announce/2020/03/msg00004.html (Mailing List, Third Party Advisory)
- https://lists.debian.org/debian-lts-announce/2020/12/msg00000.html (Mailing List, Third Party Advisory)