Vulnerability Name: | CVE-2022-28391 (CCN-223283) | ||||||||||||
Assigned: | 2022-04-03 | ||||||||||||
Published: | 2022-04-03 | ||||||||||||
Updated: | 2022-08-11 | ||||||||||||
Summary: | BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors. | ||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.9 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
7.9 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-noinfo | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-28391 Source: XF Type: UNKNOWN busybox-cve202228391-code-exec(223283) Source: MISC Type: Mailing List, Patch, Vendor Advisory https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch Source: MISC Type: Mailing List, Patch, Vendor Advisory https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch Source: CCN Type: Alpine GIT Repository netstat is vulnerable to escape sequence injection (busybox) Source: MISC Type: Exploit, Patch, Vendor Advisory https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661 | ||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||
BACK |