5.5
CVSSv3

CVE-2017-15873

Published: 24/10/2017 Updated: 18/02/2021
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

busybox busybox 1.27.2

debian debian linux 8.0

debian debian linux 9.0

canonical ubuntu linux 14.04

canonical ubuntu linux 16.04

canonical ubuntu linux 18.04

canonical ubuntu linux 18.10

Vendor Advisories

Debian Bug report logs - #879732 CVE-2017-15874 / CVE-2017-15873 Package: busybox; Maintainer for busybox is Debian Install System Team <debian-boot@listsdebianorg>; Source for busybox is src:busybox (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Wed, 25 Oct 2017 07:12:02 UTC Severity ...
Several security issues were fixed in BusyBox ...
The get_next_block function in archival/libarchive/decompress_bunzip2c in BusyBox 1272 has an Integer Overflow that may lead to a write access violation ...