Skip to content

Latest commit

 

History

History
executable file
·
43 lines (29 loc) · 1.63 KB

busybox-hush-untrusted-free-xray-189474.md

File metadata and controls

executable file
·
43 lines (29 loc) · 1.63 KB
description title date_published last_updated xray_id vul_id cvss severity discovered_by type
CVE-2021-42377 Medium severity. An attacker-controlled pointer free in Busybox hush leads to remote code execution when processing malformed command line arguments
BusyBox hush Untrusted Free
2021-11-09
2021-11-09
XRAY-189474
CVE-2021-42377
9.8
medium
JFrog Collab
vulnerability

Summary

An attacker-controlled pointer free in Busybox hush leads to remote code execution when processing malformed command line arguments

Component

BusyBox

Affected versions

BusyBox [1.33.0, 1.33.1], fixed in 1.34.0

Description

The BusyBox toolkit implements a large number of Linux tools in a single executable and can even replace the Linux init system. Its small size and flexibility make it popular in embedded devices.

An attacker-controlled pointer free in hush leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input. An attacker that controls hush command line arguments can trigger this issue.

PoC

No PoC is supplied for this issue

Vulnerability Mitigations

No vulnerability mitigations are supplied for this issue

References

(JFrog) Unboxing BusyBox - 14 new vulnerabilities uncovered by Claroty and JFrog

NVD