Skip to main content

CVE-2017-15873: n/a in n/a

Medium
VulnerabilityCVE-2017-15873cvecve-2017-15873
Published: Tue Oct 24 2017 (10/24/2017, 20:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.

AI-Powered Analysis

AILast updated: 07/10/2025, 20:48:08 UTC

Technical Analysis

CVE-2017-15873 is a medium-severity vulnerability identified in the get_next_block function within the decompress_bunzip2.c source file of the archival/libarchive component used by BusyBox version 1.27.2. The vulnerability arises from an integer overflow condition (classified under CWE-190) during the processing of bzip2 compressed data blocks. Specifically, the integer overflow can cause the calculation of buffer sizes or offsets to wrap around, leading to a write access violation when the function attempts to write data beyond the allocated memory boundaries. This can result in memory corruption, potentially causing application crashes or undefined behavior. The vulnerability requires local access (AV:L) and no privileges (PR:N) but does require user interaction (UI:R), such as processing a crafted bzip2 archive. The impact is limited to availability (A:H), with no direct confidentiality or integrity compromise reported. There are no known exploits in the wild, and no official patches or vendor advisories are linked in the provided data. BusyBox is widely used in embedded Linux systems and lightweight environments, often in routers, IoT devices, and network appliances, where libarchive is employed for decompressing archives. The vulnerability could be triggered by a maliciously crafted bzip2 archive processed by BusyBox utilities, leading to denial of service or potential further exploitation if combined with other vulnerabilities.

Potential Impact

For European organizations, the primary impact of CVE-2017-15873 is the potential disruption of services relying on BusyBox for archive decompression, particularly in embedded systems such as network routers, industrial control systems, and IoT devices prevalent in sectors like manufacturing, telecommunications, and critical infrastructure. A successful exploitation could cause device crashes or reboots, leading to temporary denial of service. While the vulnerability does not directly compromise confidentiality or integrity, availability interruptions in critical network devices could impact business operations and service continuity. Given the widespread use of BusyBox in embedded devices, organizations with extensive IoT deployments or legacy network equipment may face increased risk. Additionally, the requirement for local access and user interaction limits remote exploitation, but insider threats or compromised internal systems could leverage this vulnerability. The absence of known exploits reduces immediate risk, but the potential for targeted attacks in sensitive environments remains.

Mitigation Recommendations

To mitigate CVE-2017-15873, European organizations should: 1) Identify and inventory all devices and systems running BusyBox, particularly version 1.27.2 or earlier, focusing on embedded devices and network appliances. 2) Apply vendor-supplied patches or updates that address this vulnerability; if no official patch is available, consider upgrading BusyBox to a later version where the issue is resolved. 3) Implement strict input validation and filtering on systems that process archive files, especially those handling bzip2 compressed data, to prevent processing of untrusted or malformed archives. 4) Restrict local access to devices running BusyBox to trusted users only, employing strong authentication and access controls to minimize the risk of exploitation requiring user interaction. 5) Monitor logs and system behavior for signs of crashes or abnormal activity related to archive decompression. 6) For critical infrastructure, consider network segmentation and isolation of vulnerable devices to limit potential impact. 7) Educate users and administrators about the risks of processing untrusted archive files and enforce policies to avoid opening suspicious or unsolicited archives.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2017-10-24T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f5d1b0bd07c3938ed33

Added to database: 6/10/2025, 6:54:21 PM

Last enriched: 7/10/2025, 8:48:08 PM

Last updated: 8/13/2025, 10:54:58 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats