First published: Sun Apr 03 2022(Updated: )
BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Busybox Busybox | <=1.35.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this BusyBox vulnerability is CVE-2022-28391.
The severity of the CVE-2022-28391 vulnerability is high with a severity value of 8.8.
BusyBox through version 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal.
Remote attackers can execute arbitrary code or choose to change the terminal's colors by exploiting the CVE-2022-28391 vulnerability in BusyBox.
You can find more information about the CVE-2022-28391 vulnerability in BusyBox at the following references: [Reference 1](https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch), [Reference 2](https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch), [Reference 3](https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661).