7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.103 Low
EPSS
Percentile
94.9%
Issue Overview:
A buffer underflow flaw was found in the way the uncompress utility of BusyBox expanded certain archive files compressed using Lempel-Ziv compression. If a user were tricked into expanding a specially-crafted archive file with uncompress, it could cause BusyBox to crash or, potentially, execute arbitrary code with the privileges of the user running BusyBox. (CVE-2006-1168)
The BusyBox DHCP client, udhcpc, did not sufficiently sanitize certain options provided in DHCP server replies, such as the client hostname. A malicious DHCP server could send such an option with a specially-crafted value to a DHCP client. If this option’s value was saved on the client system, and then later insecurely evaluated by a process that assumes the option is trusted, it could lead to arbitrary code execution with the privileges of that process. (CVE-2011-2716)
Affected Packages:
busybox
Issue Correction:
Run yum update busybox to update your system.
New Packages:
i686:
busybox-1.19.3-2.11.amzn1.i686
busybox-petitboot-1.19.3-2.11.amzn1.i686
src:
busybox-1.19.3-2.11.amzn1.src
x86_64:
busybox-1.19.3-2.11.amzn1.x86_64
busybox-petitboot-1.19.3-2.11.amzn1.x86_64
Red Hat: CVE-2006-1168, CVE-2011-2716
Mitre: CVE-2006-1168, CVE-2011-2716
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | busybox | < 1.19.3-2.11.amzn1 | busybox-1.19.3-2.11.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | busybox-petitboot | < 1.19.3-2.11.amzn1 | busybox-petitboot-1.19.3-2.11.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | busybox | < 1.19.3-2.11.amzn1 | busybox-1.19.3-2.11.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | busybox-petitboot | < 1.19.3-2.11.amzn1 | busybox-petitboot-1.19.3-2.11.amzn1.x86_64.rpm |