Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-32206

Опубликовано: 27 июн. 2022
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.

A vulnerability was found in curl. This issue occurs because the number of acceptable "links" in the "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps. This flaw leads to a denial of service, either by mistake or by a malicious actor.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
.NET Core 3.1 on Red Hat Enterprise Linuxrh-dotnet31-curlOut of support scope
Red Hat Enterprise Linux 6curlNot affected
Red Hat Enterprise Linux 7curlNot affected
Red Hat Software Collectionshttpd24-curlWill not fix
JBoss Core Services for RHEL 8jbcs-httpd24-curlFixedRHSA-2022:884008.12.2022
JBoss Core Services on RHEL 7jbcs-httpd24-curlFixedRHSA-2022:884008.12.2022
Red Hat Enterprise Linux 8curlFixedRHSA-2022:615924.08.2022
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportcurlFixedRHSA-2023:346006.06.2023
Red Hat Enterprise Linux 8.4 Telecommunications Update ServicecurlFixedRHSA-2023:346006.06.2023
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionscurlFixedRHSA-2023:346006.06.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-770
https://bugzilla.redhat.com/show_bug.cgi?id=2099300curl: HTTP compression denial of service

EPSS

Процентиль: 89%
0.04546
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 3 лет назад

curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.

CVSS3: 6.5
nvd
больше 3 лет назад

curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.

CVSS3: 6.5
msrc
больше 3 лет назад

curl < 7.84.0 supports "chained" HTTP compression algorithms meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb" makingcurl end up spending enormous amounts of allocated heap memory or trying toand returning out of memory errors.

CVSS3: 6.5
debian
больше 3 лет назад

curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning ...

CVSS3: 6.5
github
больше 3 лет назад

curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.

EPSS

Процентиль: 89%
0.04546
Низкий

6.5 Medium

CVSS3