Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-43552

Опубликовано: 21 дек. 2022
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

A use after free vulnerability exists in curl <7.87.0. Curl can be asked to tunnel virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.

A vulnerability was found in curl. In this issue, curl can be asked to tunnel all protocols virtually it supports through an HTTP proxy. HTTP proxies can deny these tunnel operations using an appropriate HTTP error response code. When getting denied to tunnel the specific SMB or TELNET protocols, curl can use a heap-allocated struct after it has been freed and shut down the code path in its transfer.

Отчет

Potential successful exploitation will cause the curl to crash, which generates a low impact to the environment where the curl is used. Additionally, exploitation depends on the conditions that are out of the attacker's control, like usage of specific protocols (SMB or TELNET) and HTTP proxy tunnels at the same time. Due to these facts, this vulnerability has been classified as a Low severity issue.

Меры по смягчению последствий

Avoid using the SMB and TELNET protocols.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
.NET Core 3.1 on Red Hat Enterprise Linuxrh-dotnet31-curlOut of support scope
Red Hat Enterprise Linux 6curlOut of support scope
JBCS httpd 2.4.51.sp2curlFixedRHSA-2023:335505.06.2023
JBoss Core Services for RHEL 8jbcs-httpd24-curlFixedRHSA-2023:335405.06.2023
JBoss Core Services on RHEL 7jbcs-httpd24-curlFixedRHSA-2023:335405.06.2023
Red Hat Enterprise Linux 7curlFixedRHSA-2023:774312.12.2023
Red Hat Enterprise Linux 8curlFixedRHSA-2023:296316.05.2023
Red Hat Enterprise Linux 8.6 Extended Update SupportcurlFixedRHSA-2024:042825.01.2024
Red Hat Enterprise Linux 9curlFixedRHSA-2023:247809.05.2023
Red Hat Enterprise Linux 9curlFixedRHSA-2023:247809.05.2023

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=2152652curl: Use-after-free triggered by an HTTP proxy deny response

EPSS

Процентиль: 29%
0.00102
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 2 лет назад

A use after free vulnerability exists in curl <7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.

CVSS3: 5.9
nvd
больше 2 лет назад

A use after free vulnerability exists in curl <7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.

CVSS3: 5.9
msrc
больше 2 лет назад

Open Source Curl Remote Code Execution Vulnerability

CVSS3: 5.9
debian
больше 2 лет назад

A use after free vulnerability exists in curl <7.87.0. Curl can be ask ...

suse-cvrf
больше 2 лет назад

Security update for curl

EPSS

Процентиль: 29%
0.00102
Низкий

5.9 Medium

CVSS3