CVE-2017-16544

In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.
References
Link Resource
https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/ Third Party Advisory
https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8 Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html Mailing List Third Party Advisory
https://usn.ubuntu.com/3935-1/ Third Party Advisory
http://seclists.org/fulldisclosure/2019/Jun/18 Exploit Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Jun/14 Exploit Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Sep/7 Exploit Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Sep/7 Exploit Mailing List Third Party Advisory
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html Exploit Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2019-0013.html Third Party Advisory
http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2020/Mar/15 Exploit Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Aug/20 Exploit Mailing List Third Party Advisory
https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01 Third Party Advisory US Government Resource
http://seclists.org/fulldisclosure/2020/Sep/6 Exploit Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2021/Jan/39 Exploit Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2021/Aug/21
Configurations

Configuration 1 (hide)

cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:redlion:n-tron_702-w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:redlion:n-tron_702-w:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:redlion:n-tron_702m12-w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:redlion:n-tron_702m12-w:-:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

Information

Published : 2017-11-20 15:29

Updated : 2021-08-19 11:15


NVD link : CVE-2017-16544

Mitre link : CVE-2017-16544


JSON object : View

Products Affected

busybox

  • busybox

redlion

  • n-tron_702-w
  • n-tron_702m12-w_firmware
  • n-tron_702m12-w
  • n-tron_702-w_firmware

vmware

  • esxi

debian

  • debian_linux

canonical

  • ubuntu_linux
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')