Description
An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-29348 | An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input. |
References
History
No history.
Subscriptions
Busybox
Subscribe
Busybox
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Netapp
Subscribe
Cloud Backup
Subscribe
H300e
Subscribe
H300e Firmware
Subscribe
H300s
Subscribe
H300s Firmware
Subscribe
H410s
Subscribe
H410s Firmware
Subscribe
H500e
Subscribe
H500e Firmware
Subscribe
H500s
Subscribe
H500s Firmware
Subscribe
H700e
Subscribe
H700e Firmware
Subscribe
H700s
Subscribe
H700s Firmware
Subscribe
Hci Management Node
Subscribe
Solidfire
Subscribe
Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2024-08-04T03:30:38.349Z
Reserved: 2021-10-14T00:00:00.000Z
Link: CVE-2021-42377
No data.
Status : Modified
Published: 2021-11-15T21:15:07.700
Modified: 2024-11-21T06:27:41.657
Link: CVE-2021-42377
OpenCVE Enrichment
No data.
EUVD