busybox: Multiple vulnerabilities (CVE-2017-15873, CVE-2017-15874, CVE-2017-16544)
CVE-2017-15873: Integer overflow in the get_next_block function
The get_next_block function in
archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2
has an Integer Overflow that may lead to a write access violation.
References:
https://bugs.busybox.net/show\_bug.cgi?id=10431
https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/
Patch:
https://git.busybox.net/busybox/commit/?id=0402cb32df015d9372578e3db27db47b33d5c7b0
CVE-2017-15874: Integer underflow in archival/libarchive/decompress_unlzma.c
archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an
Integer Underflow that leads to a read access violation.
References:
https://bugs.busybox.net/show\_bug.cgi?id=10436
https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/
Patch:
Introduced in:
https://git.busybox.net/busybox/commit/?id=3989e5adf454a3ab98412b249c2c9bd2a3175ae0
Fixed by:
https://git.busybox.net/busybox/commit/?id=9ac42c500586fa5f10a1f6d22c3f797df11b1f6b
CVE-2017-16544: Insufficient sanitization of filenames when autocompleting
In the add_match function in libbb/lineedit.c in BusyBox through
1.27.2, the tab autocomplete feature of the shell,
used to get a list of filenames in a directory, does not sanitize
filenames and results in executing any escape
sequence in the terminal. This could potentially result in code
execution, arbitrary file writes, or other attacks.
References:
https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/
Patch:
https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8
(from redmine: issue id 8186, created on 2017-11-22, closed on 2017-11-23)
- Relations:
- child #8187 (closed)
- child #8188 (closed)
- child #8189 (closed)
- child #8190 (closed)
- child #8191 (closed)