Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-42377

Опубликовано: 09 нояб. 2021
Источник: redhat
CVSS3: 6.4
EPSS Низкий

Описание

An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.

A flaw was found in BusyBox, where it did not properly sanitize while processing a crafted shell command, leading to a denial of service and possible code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6busyboxNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=2023895busybox: an attacker-controlled pointer free in hush applet leads to denial of service and possible code execution when processing a crafted shell command

EPSS

Процентиль: 86%
0.03035
Низкий

6.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 3 лет назад

An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.

CVSS3: 9.8
nvd
больше 3 лет назад

An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.

CVSS3: 9.8
debian
больше 3 лет назад

An attacker-controlled pointer free in Busybox's hush applet leads to ...

CVSS3: 9.8
github
около 3 лет назад

An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.

CVSS3: 9.8
fstec
больше 3 лет назад

Уязвимость набора утилит командной строки BusyBox, связанная с освобождением неверного указателя, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 86%
0.03035
Низкий

6.4 Medium

CVSS3