In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
|
History
21 Nov 2024, 03:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2019/Jun/18 - Exploit, Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2019/Sep/7 - Exploit, Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2020/Aug/20 - Exploit, Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2020/Mar/15 - Exploit, Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2020/Sep/6 - Exploit, Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2021/Aug/21 - Exploit, Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2021/Jan/39 - Exploit, Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2022/Jun/36 - Exploit, Mailing List, Third Party Advisory | |
References | () http://www.vmware.com/security/advisories/VMSA-2019-0013.html - Third Party Advisory | |
References | () https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8 - Patch, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html - Mailing List, Third Party Advisory | |
References | () https://seclists.org/bugtraq/2019/Jun/14 - Exploit, Mailing List, Third Party Advisory | |
References | () https://seclists.org/bugtraq/2019/Sep/7 - Exploit, Mailing List, Third Party Advisory | |
References | () https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01 - Third Party Advisory, US Government Resource | |
References | () https://usn.ubuntu.com/3935-1/ - Third Party Advisory | |
References | () https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/ - Third Party Advisory |
Information
Published : 2017-11-20 15:29
Updated : 2024-11-21 03:16
NVD link : CVE-2017-16544
Mitre link : CVE-2017-16544
CVE.ORG link : CVE-2017-16544
JSON object : View
Products Affected
busybox
- busybox
redlion
- n-tron_702-w_firmware
- n-tron_702m12-w_firmware
- n-tron_702-w
- n-tron_702m12-w
canonical
- ubuntu_linux
vmware
- esxi
debian
- debian_linux
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')