{"id":"CVE-2018-1100","details":"zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.","modified":"2026-04-10T04:04:15.359880Z","published":"2018-04-11T19:29:01.027Z","related":["SUSE-SU-2018:1037-1","SUSE-SU-2018:1874-1","SUSE-SU-2022:0733-1","openSUSE-SU-2024:11543-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/12/msg00000.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1932"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3073"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201805-10"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3764-1/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1563395"},{"type":"FIX","url":"https://sourceforge.net/p/zsh/code/ci/31f72205630687c1cef89347863aab355296a27f/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/zsh-users/zsh","events":[{"introduced":"0"},{"last_affected":"6ff4787e830f8edb3a7e32490a88a131e4b62f7f"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.4.2"}]}}],"versions":["5.1.1-test-2","5.3.1-test-2","5.4","5.4.1","post-opt-arg","pre-func-move","pre-opt-arg","zsg-4.1.1-test-2","zsh-3.1.6-dev-21","zsh-3.1.6-dev-22","zsh-3.1.7","zsh-3.1.7-pre-2","zsh-3.1.7-pre-3","zsh-3.1.7-pre-4","zsh-3.1.7-prep-1","zsh-3.1.8","zsh-3.1.9","zsh-3.1.9-dev-1","zsh-3.1.9-dev-2","zsh-3.1.9-dev-3","zsh-3.1.9-dev-4","zsh-3.1.9-dev-5","zsh-3.1.9-dev-6","zsh-3.1.9-dev-7","zsh-3.1.9-dev-8","zsh-4.0.1","zsh-4.0.1-pre-1","zsh-4.0.1-pre-3","zsh-4.0.1-pre-4","zsh-4.0.1-pre-5","zsh-4.0.2-pre-2","zsh-4.1.0-dev-1","zsh-4.1.0-dev-2","zsh-4.1.0-dev-3","zsh-4.1.0-dev-4","zsh-4.1.0-dev-5","zsh-4.1.0-dev-7","zsh-4.1.1","zsh-4.1.1-test-1","zsh-4.1.1-test-3","zsh-4.2.0","zsh-4.2.0-pre-1","zsh-4.2.0-pre-2","zsh-4.2.0-pre-3","zsh-4.2.0-pre-4","zsh-4.2.1","zsh-4.2.1-test-A","zsh-4.2.2","zsh-4.2.3","zsh-4.3.0-dev-3","zsh-4.3.0-dev-4","zsh-4.3.0-dev-5","zsh-4.3.1","zsh-4.3.10","zsh-4.3.10-dev-2","zsh-4.3.10-test-3","zsh-4.3.11","zsh-4.3.11-dev-4","zsh-4.3.12","zsh-4.3.12-test-3","zsh-4.3.13","zsh-4.3.14","zsh-4.3.15","zsh-4.3.16","zsh-4.3.17","zsh-4.3.17-test-2","zsh-4.3.2","zsh-4.3.3","zsh-4.3.4","zsh-4.3.4-dev-2","zsh-4.3.4-dev-4","zsh-4.3.4-dev-5","zsh-4.3.4-dev-6","zsh-4.3.4-dev-7","zsh-4.3.4-dev-8","zsh-4.3.5","zsh-4.3.5-dev-1","zsh-4.3.5-dev-2","zsh-4.3.5-dev-3","zsh-4.3.5-dev-4","zsh-4.3.6","zsh-4.3.6-dev-1","zsh-4.3.6-dev-2","zsh-4.3.7","zsh-4.3.8","zsh-4.3.9","zsh-4.3.9-dev-3","zsh-4.3.9-dev-5","zsh-5.0.0","zsh-5.0.0-test-1","zsh-5.0.1","zsh-5.0.2","zsh-5.0.2-test-1","zsh-5.0.2-test-2","zsh-5.0.2-test-3","zsh-5.0.3","zsh-5.0.4","zsh-5.0.5","zsh-5.0.5-dev-1","zsh-5.0.5-dev-2","zsh-5.0.5-dev-3","zsh-5.0.6","zsh-5.0.6-dev-1","zsh-5.0.7","zsh-5.0.7-dev-2","zsh-5.0.7-dev-4","zsh-5.0.8","zsh-5.0.8-test-3","zsh-5.1","zsh-5.1-test-1","zsh-5.1.1","zsh-5.1.1-test-1","zsh-5.1.1-test-2","zsh-5.1.1-test-3","zsh-5.2","zsh-5.2-test-1","zsh-5.2-test-2","zsh-5.2-test-3","zsh-5.3","zsh-5.3.1","zsh-5.4","zsh-5.4.1","zsh-5.4.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1100.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}