CVE编号
CVE-2019-20044利用情况
暂无补丁情况
官方补丁披露时间
2020-02-25漏洞描述
在5.8之前的Zsh中,能够执行命令的攻击者可以重新获得--no-PRIVILEGED选项放弃的特权。 zsh无法覆盖保存的uid,因此可以通过使用调用setuid()的模块执行MODULE_PATH=/dir/with/module zmodload来恢复原始特权。解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://www.zsh.org/mla/zsh-announce/141
参考链接 |
|
---|---|
http://seclists.org/fulldisclosure/2020/May/49 | |
http://seclists.org/fulldisclosure/2020/May/53 | |
http://seclists.org/fulldisclosure/2020/May/55 | |
http://seclists.org/fulldisclosure/2020/May/59 | |
http://zsh.sourceforge.net/releases.html | |
https://github.com/XMB5/zsh-privileged-upgrade | |
https://lists.debian.org/debian-lts-announce/2020/03/msg00004.html | |
https://lists.debian.org/debian-lts-announce/2020/12/msg00000.html | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://security.gentoo.org/glsa/202003-55 | |
https://support.apple.com/HT211168 | |
https://support.apple.com/HT211170 | |
https://support.apple.com/HT211171 | |
https://support.apple.com/HT211175 | |
https://support.apple.com/kb/HT211168 | |
https://support.apple.com/kb/HT211170 | |
https://support.apple.com/kb/HT211171 | |
https://support.apple.com/kb/HT211175 | |
https://www.zsh.org/mla/zsh-announce/141 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | zsh | zsh | * |
Up to (excluding) 5.8 |
|||||
运行在以下环境 | |||||||||
系统 | alibaba_cloud_linux_2.1903 | zsh | * |
Up to (excluding) 5.0.2-34.1.al7.2 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.12 | zsh | * |
Up to (excluding) 5.8-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.13 | zsh | * |
Up to (excluding) 5.8-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.14 | zsh | * |
Up to (excluding) 5.8-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.15 | zsh | * |
Up to (excluding) 5.8-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_edge | zsh | * |
Up to (excluding) 5.8-r0 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_2 | zsh | * |
Up to (excluding) 5.7.1-6.amzn2.0.1 |
|||||
运行在以下环境 | |||||||||
系统 | centos_6 | zsh | * |
Up to (excluding) 4.3.11-11.el6_10 |
|||||
运行在以下环境 | |||||||||
系统 | centos_7 | zsh | * |
Up to (excluding) 5.0.2-34.el7_7.2 |
|||||
运行在以下环境 | |||||||||
系统 | centos_8 | zsh | * |
Up to (excluding) 5.5.1-6.el8_1.2 |
|||||
运行在以下环境 | |||||||||
系统 | debian_10 | zsh | * |
Up to (excluding) 5.7.1-1+deb10u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | zsh | * |
Up to (excluding) 5.0.7-5+deb8u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | zsh | * |
Up to (excluding) 5.3.1-4+deb9u1 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_30 | zsh | * |
Up to (excluding) 5.7.1-6.fc30 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_31 | zsh | * |
Up to (excluding) 5.7.1-6.fc31 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.3 | zsh | * |
Up to (excluding) 5.6-7.5.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.4 | zsh | * |
Up to (excluding) 5.6-7.5.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_6 | zsh | * |
Up to (excluding) 4.3.11-11.el6_10 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_7 | zsh | * |
Up to (excluding) 5.0.2-34.el7_7.2 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_8 | zsh | * |
Up to (excluding) 5.5.1-6.el8_1.2 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_8 | zsh | * |
Up to (excluding) 5.5.1-6.el8_1.2 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | zsh | * |
Up to (excluding) 5.0.5-6.19.1 |
|||||
- 攻击路径 本地
- 攻击复杂度 复杂
- 权限要求 普通权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...