The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.
References
Link | Resource |
---|---|
https://git.busybox.net/busybox/commit/?id=0402cb32df015d9372578e3db27db47b33d5c7b0 | Issue Tracking Patch Third Party Advisory |
https://bugs.busybox.net/show_bug.cgi?id=10431 | Exploit Issue Tracking Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html | Mailing List Third Party Advisory |
https://usn.ubuntu.com/3935-1/ | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2017-10-24 13:29
Updated : 2021-02-18 06:43
NVD link : CVE-2017-15873
Mitre link : CVE-2017-15873
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
busybox
- busybox