SB2021102722 - SUSE update for busybox
Published: October 27, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Path traversal (CVE-ID: CVE-2011-5325)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in the BusyBox implementation of tar. A remote attacker can trick pass specially crafted tar archive to the application and overwrite files outside the current working directory via a symlink.
2) Improper Certificate Validation (CVE-ID: CVE-2018-1000500)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file".
3) Buffer overflow (CVE-ID: CVE-2018-1000517)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.
4) Out-of-bounds read (CVE-ID: CVE-2018-20679)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in udhcp components (consumed by the DHCP server, client, and relay). A remote attacker can leak sensitive information from the stack by sending a crafted DHCP message.
5) Improper Handling of Exceptional Conditions (CVE-ID: CVE-2021-28831)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper handling of error bit on the huft_build result pointer in decompress_gunzip.c. A remote attacker can pass malformed gzip data to the application, trigger an invalid free and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.