Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-8285

Опубликовано: 09 дек. 2020
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.

Libcurl offers a wildcard matching functionality, which allows a callback (set with CURLOPT_CHUNK_BGN_FUNCTION) to return information back to libcurl on how to handle a specific entry in a directory when libcurl iterates over a list of all available entries. When this callback returns CURL_CHUNK_BGN_FUNC_SKIP, to tell libcurl to not deal with that file, the internal function in libcurl then calls itself recursively to handle the next directory entry. If there's a sufficient amount of file entries and if the callback returns "skip" enough number of times, libcurl runs out of stack space. The exact amount will of course vary with platforms, compilers and other environmental factors.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
.NET Core 2.1 on Red Hat Enterprise Linuxrh-dotnet21-curlNot affected
.NET Core 3.1 on Red Hat Enterprise Linuxrh-dotnet31-curlNot affected
Red Hat Ceph Storage 2curlOut of support scope
Red Hat Enterprise Linux 5curlOut of support scope
Red Hat Enterprise Linux 6curlOut of support scope
Red Hat Enterprise Linux 7curlOut of support scope
Red Hat Software Collectionshttpd24-curlWill not fix
JBoss Core Services Apache HTTP Server 2.4.37 SP8jbcs-httpd24-curlFixedRHSA-2021:247117.06.2021
JBoss Core Services for RHEL 8jbcs-httpd24FixedRHSA-2021:247217.06.2021
JBoss Core Services for RHEL 8jbcs-httpd24-aprFixedRHSA-2021:247217.06.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-674->CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=1902687curl: Malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used

EPSS

Процентиль: 69%
0.00594
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 5 лет назад

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.

CVSS3: 7.5
nvd
около 5 лет назад

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.

CVSS3: 7.5
msrc
около 5 лет назад

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.

CVSS3: 7.5
debian
около 5 лет назад

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recu ...

CVSS3: 7.5
github
больше 3 лет назад

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.

EPSS

Процентиль: 69%
0.00594
Низкий

6.5 Medium

CVSS3