Lucene search

K
amazonAmazonALAS-2012-103
HistoryJul 05, 2012 - 4:23 p.m.

Low: busybox

2012-07-0516:23:00
alas.aws.amazon.com
40

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.103 Low

EPSS

Percentile

94.9%

Issue Overview:

A buffer underflow flaw was found in the way the uncompress utility of BusyBox expanded certain archive files compressed using Lempel-Ziv compression. If a user were tricked into expanding a specially-crafted archive file with uncompress, it could cause BusyBox to crash or, potentially, execute arbitrary code with the privileges of the user running BusyBox. (CVE-2006-1168)

The BusyBox DHCP client, udhcpc, did not sufficiently sanitize certain options provided in DHCP server replies, such as the client hostname. A malicious DHCP server could send such an option with a specially-crafted value to a DHCP client. If this option’s value was saved on the client system, and then later insecurely evaluated by a process that assumes the option is trusted, it could lead to arbitrary code execution with the privileges of that process. (CVE-2011-2716)

Affected Packages:

busybox

Issue Correction:
Run yum update busybox to update your system.

New Packages:

i686:  
    busybox-1.19.3-2.11.amzn1.i686  
    busybox-petitboot-1.19.3-2.11.amzn1.i686  
  
src:  
    busybox-1.19.3-2.11.amzn1.src  
  
x86_64:  
    busybox-1.19.3-2.11.amzn1.x86_64  
    busybox-petitboot-1.19.3-2.11.amzn1.x86_64  

Additional References

Red Hat: CVE-2006-1168, CVE-2011-2716

Mitre: CVE-2006-1168, CVE-2011-2716

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.103 Low

EPSS

Percentile

94.9%