Search for packages
purl | pkg:deb/ubuntu/busybox@1:1.27.2-2ubuntu4.1 |
Next non-vulnerable version | 1:1.30.1-4ubuntu6.3 |
Latest non-vulnerable version | 1:1.30.1-4ubuntu6.3 |
Risk | 10.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-4cd9-j7dj-aaad
Aliases: CVE-2018-1000500 |
Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file". |
Affected by 4 other vulnerabilities. |
VCID-7pk9-skex-aaam
Aliases: CVE-2021-42373 |
A NULL pointer dereference in Busybox's man applet leads to denial of service when a section name is supplied but no page argument is given |
Affected by 0 other vulnerabilities. |
VCID-av9h-6859-aaac
Aliases: CVE-2021-42377 |
An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input. |
Affected by 0 other vulnerabilities. |
VCID-bczg-wjhp-aaad
Aliases: CVE-2021-42383 |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function |
Affected by 0 other vulnerabilities. |
VCID-ebet-us66-aaaf
Aliases: CVE-2021-42375 |
An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input. |
Affected by 0 other vulnerabilities. |
VCID-fh7w-72hj-aaan
Aliases: CVE-2018-1000517 |
BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e. |
Affected by 5 other vulnerabilities. |
VCID-us64-n1gm-aaas
Aliases: CVE-2018-20679 |
An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes. |
Affected by 5 other vulnerabilities. |
VCID-v4xt-eprq-aaag
Aliases: CVE-2019-5747 |
An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679. |
Affected by 5 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|