SB2015032902 - Gentoo update for BusyBox



SB2015032902 - Gentoo update for BusyBox

Published: March 29, 2015 Updated: September 25, 2016

Security Bulletin ID SB2015032902
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Integer overflow (CVE-ID: CVE-2014-4607)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Integer overflow in the LZO algorithm variant in Oberhumer liblzo2 and lzo-2 before 2.07 on 32-bit platforms might allow remote attackers to execute arbitrary code via a crafted Literal Run.


2) Input validation error (CVE-ID: CVE-2014-9645)

The vulnerability allows a local authenticated user to manipulate data.

The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command.


Remediation

Install update from vendor's website.