Description
An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.
Published: 2021-11-15
Score: 9.8 Critical
EPSS: 2.9% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-29348 An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.
History

No history.

Subscriptions

Busybox Busybox
Fedoraproject Fedora
Netapp Cloud Backup H300e H300e Firmware H300s H300s Firmware H410s H410s Firmware H500e H500e Firmware H500s H500s Firmware H700e H700e Firmware H700s H700s Firmware Hci Management Node Solidfire
cve-icon MITRE

Status: PUBLISHED

Assigner: JFROG

Published:

Updated: 2024-08-04T03:30:38.349Z

Reserved: 2021-10-14T00:00:00.000Z

Link: CVE-2021-42377

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-11-15T21:15:07.700

Modified: 2024-11-21T06:27:41.657

Link: CVE-2021-42377

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-11-09T00:00:00Z

Links: CVE-2021-42377 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses