An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.
References
| Link | Resource |
|---|---|
| https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ | Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/ | Mailing List Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/ | Mailing List Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20211223-0002/ |
Information
Published : 2021-11-15 21:15
Updated : 2021-12-23 13:15
NVD link : CVE-2021-42377
Mitre link : CVE-2021-42377
JSON object : View
Products Affected
fedoraproject
- fedora
busybox
- busybox
CWE
CWE-763
Release of Invalid Pointer or Reference
