Description
An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-29348 | An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input. |
References
History
No history.
Subscriptions
Busybox
Subscribe
Busybox
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Netapp
Subscribe
Cloud Backup
Subscribe
H300e
Subscribe
H300e Firmware
Subscribe
H300s
Subscribe
H300s Firmware
Subscribe
H410s
Subscribe
H410s Firmware
Subscribe
H500e
Subscribe
H500e Firmware
Subscribe
H500s
Subscribe
H500s Firmware
Subscribe
H700e
Subscribe
H700e Firmware
Subscribe
H700s
Subscribe
H700s Firmware
Subscribe
Hci Management Node
Subscribe
Solidfire
Subscribe
Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2024-08-04T03:30:38.349Z
Reserved: 2021-10-14T00:00:00.000Z
Link: CVE-2021-42377
No data.
Status : Modified
Published: 2021-11-15T21:15:07.700
Modified: 2024-11-21T06:27:41.657
Link: CVE-2021-42377
OpenCVE Enrichment
No data.
EUVD