Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-42377

Опубликовано: 15 нояб. 2021
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 6.8
CVSS3: 9.8

Описание

An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.

РелизСтатусПримечание
bionic

not-affected

1:1.27.2-2ubuntu3.3
devel

not-affected

1:1.30.1-6ubuntu3
esm-infra-legacy/trusty

not-affected

esm-infra/bionic

not-affected

1:1.27.2-2ubuntu3.3
esm-infra/focal

not-affected

1:1.30.1-4ubuntu6.3
esm-infra/xenial

not-affected

focal

not-affected

1:1.30.1-4ubuntu6.3
hirsute

not-affected

1:1.30.1-6ubuntu2
impish

not-affected

1:1.30.1-6ubuntu3
jammy

not-affected

1:1.30.1-6ubuntu3

Показывать по

EPSS

Процентиль: 86%
0.03035
Низкий

6.8 Medium

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 6.4
redhat
больше 3 лет назад

An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.

CVSS3: 9.8
nvd
больше 3 лет назад

An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.

CVSS3: 9.8
debian
больше 3 лет назад

An attacker-controlled pointer free in Busybox's hush applet leads to ...

CVSS3: 9.8
github
около 3 лет назад

An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.

CVSS3: 9.8
fstec
больше 3 лет назад

Уязвимость набора утилит командной строки BusyBox, связанная с освобождением неверного указателя, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 86%
0.03035
Низкий

6.8 Medium

CVSS2

9.8 Critical

CVSS3