SB2022112855 - SUSE update for busybox 



SB2022112855 - SUSE update for busybox

Published: November 28, 2022

Security Bulletin ID SB2022112855
Severity
High
Patch available
YES
Number of vulnerabilities 28
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 11% Medium 29% Low 61%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 28 secuirty vulnerabilities.


1) Path traversal (CVE-ID: CVE-2011-5325)

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in the BusyBox implementation of tar. A remote attacker can trick pass specially crafted tar archive to the application and overwrite files outside the current working directory via a symlink.


2) Input validation error (CVE-ID: CVE-2014-9645)

The vulnerability allows a local authenticated user to manipulate data.

The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command.


3) NULL pointer dereference (CVE-ID: CVE-2015-9261)

The vulnerability allows a local non-authenticated attacker to perform a denial of service (DoS) attack.

huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.


4) Integer overflow (CVE-ID: CVE-2016-2147)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.


5) Heap-based buffer overflow (CVE-ID: CVE-2016-2148)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in udhcpc client when parsing DHCP packets with specially crafted OPTION_6RD option. A remote attacker can trick the victim to connect to malicious DHCP server, trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


6) Resource management error (CVE-ID: CVE-2016-6301)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.


7) Integer overflow (CVE-ID: CVE-2017-15873)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the get_next_block function in archival/libarchive/decompress_bunzip2.c due to integer overflow. A remote attacker can trigger write access violation and cause the service to crash.

8) Integer overflow (CVE-ID: CVE-2017-15874)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the archival/libarchive/decompress_unlzma.c due to integer overflow. A remote attacker can trigger read access violation and cause the service to crash.

9) Improper input validation (CVE-ID: CVE-2017-16544)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists in the add_match function in libbb/lineedit.c due to the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. A remote attacker can execute arbitrary code with the system privileges and write arbitrary files.

Successful exploitation of the vulnerability may result in system compromise.

10) Improper Certificate Validation (CVE-ID: CVE-2018-1000500)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file".


11) Buffer overflow (CVE-ID: CVE-2018-1000517)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.


12) Out-of-bounds read (CVE-ID: CVE-2018-20679)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in udhcp components (consumed by the DHCP server, client, and relay). A remote attacker can leak sensitive information from the stack by sending a crafted DHCP message.


13) Out-of-bounds read (CVE-ID: CVE-2019-5747)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in udhcp components (consumed by the DHCP server, client, and/or relay). A remote attacker can leak sensitive information from the stack by sending a crafted DHCP message.


14) Improper Handling of Exceptional Conditions (CVE-ID: CVE-2021-28831)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper handling of error bit on the huft_build result pointer in decompress_gunzip.c. A remote attacker can pass malformed gzip data to the application, trigger an invalid free and perform a denial of service (DoS) attack.


15) NULL pointer dereference (CVE-ID: CVE-2021-42373)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the man applet when a section name is supplied but no page argument is given. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.


16) Out-of-bounds read (CVE-ID: CVE-2021-42374)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in "unlzma". A remote attacker can trigger out-of-bounds read error and read contents of memory on the system or perform a denial of service (DoS) attack.


17) Input validation error (CVE-ID: CVE-2021-42375)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within the ash applet. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.


18) NULL pointer dereference (CVE-ID: CVE-2021-42376)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in Busybox's hush applet when processing a crafted shell command with a \x03 delimiter character. A local user can pass specially crafted string to the affected applet and crash the application.


19) Release of invalid pointer or reference (CVE-ID: CVE-2021-42377)

The vulnerability allows a remote attacker execute arbitrary code on the system.

The vulnerability exists due to improper input validation within the hush applet. A remote attacker can pass a specially crafted input to the application and potentially execute arbitrary shell commands.


20) Use-after-free (CVE-ID: CVE-2021-42378)

The vulnerability allows a remote user to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in the "getvar_i" function. A remote administrator can execute arbitrary code on the target system.


21) Use-after-free (CVE-ID: CVE-2021-42379)

The vulnerability allows a remote user to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in the "next_input_file" function. A remote administrator can execute arbitrary code on the target system.


22) Use-after-free (CVE-ID: CVE-2021-42380)

The vulnerability allows a remote user to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in the "next_input_file" function. A remote administrator can execute arbitrary code on the target system.


23) Use-after-free (CVE-ID: CVE-2021-42381)

The vulnerability allows a remote user to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in the "hash_init" function. A remote administrator can execute arbitrary code on the target system.


24) Use-after-free (CVE-ID: CVE-2021-42382)

The vulnerability allows a remote user to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in the "getvar_s" function. A remote administrator can execute arbitrary code on the target system.


25) Use-after-free (CVE-ID: CVE-2021-42383)

The vulnerability allows a remote user to compromise vulnerable system.

The vulnerability exists due to a use-after-free error within the awk applet. A remote privileged user can pass a specially crafted input to the application, trigger a use-after-free error and execute arbitrary code.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


26) Use-after-free (CVE-ID: CVE-2021-42384)

The vulnerability allows a remote user to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in the "handle_special" function. A remote administrator can execute arbitrary code on the target system.


27) Use-after-free (CVE-ID: CVE-2021-42385)

The vulnerability allows a remote user to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in the "evaluate" function. A remote administrator can execute arbitrary code on the target system.


28) Use-after-free (CVE-ID: CVE-2021-42386)

The vulnerability allows a remote user to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in the "nvalloc" function. A remote administrator can execute arbitrary code on the target system.


Remediation

Install update from vendor's website.