Security update for Huawei EulerOS busybo
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | EulerOS 2.0 SP9 : busybox (EulerOS-SA-2022-1287) | 2 Mar 202200:00 | β | nessus |
![]() | EulerOS 2.0 SP9 : busybox (EulerOS-SA-2022-1303) | 2 Mar 202200:00 | β | nessus |
![]() | EulerOS 2.0 SP10 : busybox (EulerOS-SA-2022-1472) | 20 Apr 202200:00 | β | nessus |
![]() | EulerOS 2.0 SP10 : busybox (EulerOS-SA-2022-1463) | 20 Apr 202200:00 | β | nessus |
![]() | Ubuntu 18.04 LTS / 20.04 LTS : BusyBox vulnerabilities (USN-5179-1) | 8 Dec 202100:00 | β | nessus |
![]() | Amazon Linux AMI : busybox (ALAS-2022-1558) | 19 Jan 202200:00 | β | nessus |
![]() | GLSA-202407-17 : BusyBox: Multiple Vulnerabilities | 5 Jul 202400:00 | β | nessus |
![]() | Debian dla-4019 : busybox - security update | 19 Jan 202500:00 | β | nessus |
![]() | SUSE SLES15 Security Update : busybox (SUSE-SU-2022:0135-2) | 15 Feb 202200:00 | β | nessus |
![]() | openSUSE 15 Security Update : busybox (openSUSE-SU-2022:0135-1) | 21 Jan 202200:00 | β | nessus |
Source | Link |
---|---|
developer | www.developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html |
# SPDX-FileCopyrightText: 2022 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.2.2022.1287");
script_cve_id("CVE-2021-42374", "CVE-2021-42376", "CVE-2021-42378", "CVE-2021-42379", "CVE-2021-42380", "CVE-2021-42381", "CVE-2021-42382", "CVE-2021-42383", "CVE-2021-42384", "CVE-2021-42385", "CVE-2021-42386");
script_tag(name:"creation_date", value:"2022-03-02 14:40:28 +0000 (Wed, 02 Mar 2022)");
script_version("2024-02-05T14:36:56+0000");
script_tag(name:"last_modification", value:"2024-02-05 14:36:56 +0000 (Mon, 05 Feb 2024)");
script_tag(name:"cvss_base", value:"6.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:P/I:P/A:P");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2021-11-16 21:50:55 +0000 (Tue, 16 Nov 2021)");
script_name("Huawei EulerOS: Security Advisory for busybox (EulerOS-SA-2022-1287)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2022 Greenbone AG");
script_family("Huawei EulerOS Local Security Checks");
script_dependencies("gb_huawei_euleros_consolidation.nasl");
script_mandatory_keys("ssh/login/euleros", "ssh/login/rpms", re:"ssh/login/release=EULEROS\-2\.0SP9\-X86_64");
script_xref(name:"Advisory-ID", value:"EulerOS-SA-2022-1287");
script_xref(name:"URL", value:"https://developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html?secId=EulerOS-SA-2022-1287");
script_tag(name:"summary", value:"The remote host is missing an update for the Huawei EulerOS 'busybox' package(s) announced via the EulerOS-SA-2022-1287 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function(CVE-2021-42382)
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function(CVE-2021-42384)
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function(CVE-2021-42378)
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function(CVE-2021-42385)
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function(CVE-2021-42380)
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function(CVE-2021-42383)
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function(CVE-2021-42381)
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function(CVE-2021-42379)
A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function(CVE-2021-42386)
A NULL pointer dereference in hushleads to denial of service when processing a crafted shell command, due to missing validation after a \x03delimiter character. This may be used for DoS under very rare conditions of filtered command input.(CVE-2021-42376)
An out-of-bounds heap read in unlzmaleads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that internally supports LZMA compression.(CVE-2021-42374)");
script_tag(name:"affected", value:"'busybox' package(s) on Huawei EulerOS V2.0SP9(x86_64).");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "EULEROS-2.0SP9-x86_64") {
if(!isnull(res = isrpmvuln(pkg:"busybox-help", rpm:"busybox-help~1.31.1~6.h3.r2.eulerosv2r9", rls:"EULEROS-2.0SP9-x86_64"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo