Low: busybox

2014-09-14T16:43:00
ID ALAS-2012-103
Type amazon
Reporter Amazon
Modified 2014-09-14T16:43:00

Description

Issue Overview:

A buffer underflow flaw was found in the way the uncompress utility of BusyBox expanded certain archive files compressed using Lempel-Ziv compression. If a user were tricked into expanding a specially-crafted archive file with uncompress, it could cause BusyBox to crash or, potentially, execute arbitrary code with the privileges of the user running BusyBox. (CVE-2006-1168 __)

The BusyBox DHCP client, udhcpc, did not sufficiently sanitize certain options provided in DHCP server replies, such as the client hostname. A malicious DHCP server could send such an option with a specially-crafted value to a DHCP client. If this option's value was saved on the client system, and then later insecurely evaluated by a process that assumes the option is trusted, it could lead to arbitrary code execution with the privileges of that process. (CVE-2011-2716 __)

Affected Packages:

busybox

Issue Correction:
Run yum update busybox to update your system.

New Packages:

i686:  
    busybox-1.19.3-2.11.amzn1.i686  
    busybox-petitboot-1.19.3-2.11.amzn1.i686

src:  
    busybox-1.19.3-2.11.amzn1.src

x86_64:  
    busybox-1.19.3-2.11.amzn1.x86_64  
    busybox-petitboot-1.19.3-2.11.amzn1.x86_64