Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2017-15873: n/a in n/a

0
Medium
VulnerabilityCVE-2017-15873cvecve-2017-15873
Published: Tue Oct 24 2017 (10/24/2017, 20:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.

AI-Powered Analysis

AILast updated: 07/10/2025, 20:48:08 UTC

Technical Analysis

CVE-2017-15873 is a medium-severity vulnerability identified in the get_next_block function within the decompress_bunzip2.c source file of the archival/libarchive component used by BusyBox version 1.27.2. The vulnerability arises from an integer overflow condition (classified under CWE-190) during the processing of bzip2 compressed data blocks. Specifically, the integer overflow can cause the calculation of buffer sizes or offsets to wrap around, leading to a write access violation when the function attempts to write data beyond the allocated memory boundaries. This can result in memory corruption, potentially causing application crashes or undefined behavior. The vulnerability requires local access (AV:L) and no privileges (PR:N) but does require user interaction (UI:R), such as processing a crafted bzip2 archive. The impact is limited to availability (A:H), with no direct confidentiality or integrity compromise reported. There are no known exploits in the wild, and no official patches or vendor advisories are linked in the provided data. BusyBox is widely used in embedded Linux systems and lightweight environments, often in routers, IoT devices, and network appliances, where libarchive is employed for decompressing archives. The vulnerability could be triggered by a maliciously crafted bzip2 archive processed by BusyBox utilities, leading to denial of service or potential further exploitation if combined with other vulnerabilities.

Potential Impact

For European organizations, the primary impact of CVE-2017-15873 is the potential disruption of services relying on BusyBox for archive decompression, particularly in embedded systems such as network routers, industrial control systems, and IoT devices prevalent in sectors like manufacturing, telecommunications, and critical infrastructure. A successful exploitation could cause device crashes or reboots, leading to temporary denial of service. While the vulnerability does not directly compromise confidentiality or integrity, availability interruptions in critical network devices could impact business operations and service continuity. Given the widespread use of BusyBox in embedded devices, organizations with extensive IoT deployments or legacy network equipment may face increased risk. Additionally, the requirement for local access and user interaction limits remote exploitation, but insider threats or compromised internal systems could leverage this vulnerability. The absence of known exploits reduces immediate risk, but the potential for targeted attacks in sensitive environments remains.

Mitigation Recommendations

To mitigate CVE-2017-15873, European organizations should: 1) Identify and inventory all devices and systems running BusyBox, particularly version 1.27.2 or earlier, focusing on embedded devices and network appliances. 2) Apply vendor-supplied patches or updates that address this vulnerability; if no official patch is available, consider upgrading BusyBox to a later version where the issue is resolved. 3) Implement strict input validation and filtering on systems that process archive files, especially those handling bzip2 compressed data, to prevent processing of untrusted or malformed archives. 4) Restrict local access to devices running BusyBox to trusted users only, employing strong authentication and access controls to minimize the risk of exploitation requiring user interaction. 5) Monitor logs and system behavior for signs of crashes or abnormal activity related to archive decompression. 6) For critical infrastructure, consider network segmentation and isolation of vulnerable devices to limit potential impact. 7) Educate users and administrators about the risks of processing untrusted archive files and enforce policies to avoid opening suspicious or unsolicited archives.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2017-10-24T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f5d1b0bd07c3938ed33

Added to database: 6/10/2025, 6:54:21 PM

Last enriched: 7/10/2025, 8:48:08 PM

Last updated: 2/7/2026, 4:22:07 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats