Zsh Mailing List Archive
Messages sorted by:
Reverse Date,
Date,
Thread,
Author
Re: Zsh - Multiple DoS Vulnerabilities
- X-seq: zsh-workers 44300
- From: "Daniel Shahaf" <d.s@xxxxxxxxxxxxxxxxxx>
- To: "David Wells" <bughunters@xxxxxxxxxxx>
- Subject: Re: Zsh - Multiple DoS Vulnerabilities
- Date: Tue, 14 May 2019 21:24:22 +0000
- Cc: zsh-workers@xxxxxxx
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= daniel.shahaf.name; h=mime-version:message-id:in-reply-to :references:date:from:to:cc:subject:content-type; s=fm3; bh=r280 X7Yo10R19OoF30y2gbyVTdl/GQ9xTyr/4Y/9BlM=; b=TlS1w8wg+7mSPEW5JUpl SMYTfLqBc2Dwp3Mttk+ZE8Gqn8uxt233GRIpKHTBH8D73ukenvBoYCS0DuEqo5+E tv5ttt7APzRFid45QFZzktoLIR3mHvX2IHrps2X8cXP2jpCnTyLRUzX6rXkq/oNZ 9vDgTRvUWE8Z5VMZ1frt7igLxMM2LPUh3s0OUh/rZn+lzFe0iTFAXlaNpeb/SwL4 grEPNpVl5pP99Dk3+2y+k6CxR4aiojkeOQ3l+hBAG9FBckwsIfmQT2cMGn6BQBQv p5O6meY37CcMOkLZnUh9ijt9azbbvdMyKntJKTGRN1JSfI+keCwIwQ5qwJMy4osa SQ==
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm2; bh=r280X7 Yo10R19OoF30y2gbyVTdl/GQ9xTyr/4Y/9BlM=; b=VG7ujpKFmZzeL988KJ25FV LuU0opXE/rN3uSUInWa8bNjqxkinf659wpBO3jcLo1+yt0dk4mtGlpEIaFd2kUvP QDlSiTyQRCsMulJr5bLeCf2mAoonoztdPSM6aG3qgV6uKLv/5fo9qTbhzAre2FFT REdn6Z5lpbFfoAgLY+bPiK7svbHGLVcN6hHhz19NQCtF6uD4J88gcNrhk2zt0AwC I4MmclT6f50oVi8L9305z2urO+dFex/RVVWMS/92DdFv9rsKTvAJ3jVoOckCAtS4 J3uweDdl46uZErWtwX6pKO+Pl0Tc+5dgiEAWJJWuYbDAG7LCltGON5SLxSs+lZgg ==
- In-reply-to: <20190514181026.u4myftmekdtqkhme@chaz.gmail.com>
- List-help: <mailto:zsh-workers-help@zsh.org>
- List-id: Zsh Workers List <zsh-workers.zsh.org>
- List-post: <mailto:zsh-workers@zsh.org>
- List-unsubscribe: <mailto:zsh-workers-unsubscribe@zsh.org>
- Mailing-list: contact zsh-workers-help@xxxxxxx; run by ezmlm
- References: <CAAOKOsfSAR5aRBvEcyQKRzDCvOgRJdyRvVb9AXMq6d22RaUozQ@mail.gmail.com> <CAH+w=7YSL2eLRWeXaZj09er-v4noxuALxAum5Zj4awLP=7mQRQ@mail.gmail.com> <20190512162149.3fsqupqftmwxrbvd@chaz.gmail.com> <CAAOKOsfq-BDfbD1MD01f-soJdhK=rbvr-1kHubCs9uT4GNhG0g@mail.gmail.com> <20190514181026.u4myftmekdtqkhme@chaz.gmail.com>
Stephane Chazelas wrote on Tue, 14 May 2019 18:11 +00:00:
> IMO, from a security standpoint, it's not very useful to fuzz
> "code" input provided to zsh, as anyway any "code" allows zsh to
> run any arbitrary command (except for the restricted mode). In
> other words, the "code" is generally not the attacker supplied
> data.
Sounds right. There might be some corner case here
> You could fuzz environment variables (the ones zsh cares
> about) or other attacker-controlled data fed to zsh scripts like
> "limits" instead.
Messages sorted by:
Reverse Date,
Date,
Thread,
Author