Amazon Linux AMI : busybox Multiple Vulnerabilities (ALAS-2012-103)

This script is Copyright (C) 2013 Tenable Network Security, Inc.

Synopsis :

The remote Amazon Linux AMI host is missing a security update.

Description :

The BusyBox DHCP client, udhcpc, did not sufficiently sanitize certain
options provided in DHCP server replies, such as the client hostname.
A malicious DHCP server could send such an option with a
specially-crafted value to a DHCP client. If this option's value was
saved on the client system, and then later insecurely evaluated by a
process that assumes the option is trusted, it could lead to arbitrary
code execution with the privileges of that process. Note: udhcpc is
not used on Red Hat Enterprise Linux by default, and no DHCP client
script is provided with the busybox packages. (CVE-2011-2716)

A buffer underflow flaw was found in the way the uncompress utility of
BusyBox expanded certain archive files compressed using Lempel-Ziv
compression. If a user were tricked into expanding a specially-crafted
archive file with uncompress, it could cause BusyBox to crash or,
potentially, execute arbitrary code with the privileges of the user
running BusyBox. (CVE-2006-1168)

See also :

Solution :

Run 'yum update busybox' to update your system.

Risk factor :

High / CVSS Base Score : 7.5

Family: Amazon Linux Local Security Checks

Nessus Plugin ID: 69593 ()

Bugtraq ID:

CVE ID: CVE-2006-1168