Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xc3w-ghxg-pw5f

Опубликовано: 26 июл. 2023
Источник: github
Github: Не прошло ревью

Описание

libcurl can be told to save cookie, HSTS and/or alt-svc data to files. When doing this, it called stat() followed by fopen() in a way that made it vulnerable to a TOCTOU race condition problem.

By exploiting this flaw, an attacker could trick the victim to create or overwrite protected files holding this data in ways it was not intended to.

libcurl can be told to save cookie, HSTS and/or alt-svc data to files. When doing this, it called stat() followed by fopen() in a way that made it vulnerable to a TOCTOU race condition problem.

By exploiting this flaw, an attacker could trick the victim to create or overwrite protected files holding this data in ways it was not intended to.

Связанные уязвимости

ubuntu
больше 2 лет назад

Rejected reason: We issued this CVE pre-maturely, as we have subsequently realized that this issue points out a problem that there really is no safe measures around or protections for.

CVSS3: 5.5
redhat
больше 2 лет назад

A flaw was found in the curl package. This race condition modifies the behavior of symbolic link files in affected components which might be followed instead of overwritten when the condition is met, leading to undesired and potentially destructive behavior.

nvd
больше 2 лет назад

Rejected reason: We issued this CVE pre-maturely, as we have subsequently realized that this issue points out a problem that there really is no safe measures around or protections for.

msrc
больше 1 года назад

Описание отсутствует

suse-cvrf
больше 2 лет назад

Security update for curl