Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-32206

Опубликовано: 27 июн. 2022
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.

A vulnerability was found in curl. This issue occurs because the number of acceptable "links" in the "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps. This flaw leads to a denial of service, either by mistake or by a malicious actor.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
.NET Core 3.1 on Red Hat Enterprise Linuxrh-dotnet31-curlOut of support scope
Red Hat Enterprise Linux 6curlNot affected
Red Hat Enterprise Linux 7curlNot affected
Red Hat Software Collectionshttpd24-curlWill not fix
Red Hat Enterprise Linux 8curlFixedRHSA-2022:615924.08.2022
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportcurlFixedRHSA-2023:346006.06.2023
Red Hat Enterprise Linux 8.4 Telecommunications Update ServicecurlFixedRHSA-2023:346006.06.2023
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionscurlFixedRHSA-2023:346006.06.2023
Red Hat Enterprise Linux 9curlFixedRHSA-2022:615724.08.2022
Red Hat Enterprise Linux 9curlFixedRHSA-2022:615724.08.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-770
https://bugzilla.redhat.com/show_bug.cgi?id=2099300curl: HTTP compression denial of service

EPSS

Процентиль: 85%
0.02535
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 3 лет назад

curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.

CVSS3: 6.5
nvd
около 3 лет назад

curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.

CVSS3: 6.5
msrc
около 3 лет назад

Описание отсутствует

CVSS3: 6.5
debian
около 3 лет назад

curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning ...

CVSS3: 6.5
github
около 3 лет назад

curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.

EPSS

Процентиль: 85%
0.02535
Низкий

6.5 Medium

CVSS3