Описание
A use after free vulnerability exists in curl <7.87.0. Curl can be asked to tunnel virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.
A vulnerability was found in curl. In this issue, curl can be asked to tunnel all protocols virtually it supports through an HTTP proxy. HTTP proxies can deny these tunnel operations using an appropriate HTTP error response code. When getting denied to tunnel the specific SMB or TELNET protocols, curl can use a heap-allocated struct after it has been freed and shut down the code path in its transfer.
Отчет
Potential successful exploitation will cause the curl to crash, which generates a low impact to the environment where the curl is used. Additionally, exploitation depends on the conditions that are out of the attacker's control, like usage of specific protocols (SMB or TELNET) and HTTP proxy tunnels at the same time. Due to these facts, this vulnerability has been classified as a Low severity issue.
Меры по смягчению последствий
Avoid using the SMB and TELNET protocols.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
.NET Core 3.1 on Red Hat Enterprise Linux | rh-dotnet31-curl | Out of support scope | ||
Red Hat Enterprise Linux 6 | curl | Out of support scope | ||
JBCS httpd 2.4.51.sp2 | curl | Fixed | RHSA-2023:3355 | 05.06.2023 |
JBoss Core Services for RHEL 8 | jbcs-httpd24-curl | Fixed | RHSA-2023:3354 | 05.06.2023 |
JBoss Core Services on RHEL 7 | jbcs-httpd24-curl | Fixed | RHSA-2023:3354 | 05.06.2023 |
Red Hat Enterprise Linux 7 | curl | Fixed | RHSA-2023:7743 | 12.12.2023 |
Red Hat Enterprise Linux 8 | curl | Fixed | RHSA-2023:2963 | 16.05.2023 |
Red Hat Enterprise Linux 8.6 Extended Update Support | curl | Fixed | RHSA-2024:0428 | 25.01.2024 |
Red Hat Enterprise Linux 9 | curl | Fixed | RHSA-2023:2478 | 09.05.2023 |
Red Hat Enterprise Linux 9 | curl | Fixed | RHSA-2023:2478 | 09.05.2023 |
Показывать по
Дополнительная информация
Статус:
EPSS
5.9 Medium
CVSS3
Связанные уязвимости
A use after free vulnerability exists in curl <7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.
A use after free vulnerability exists in curl <7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.
A use after free vulnerability exists in curl <7.87.0. Curl can be ask ...
EPSS
5.9 Medium
CVSS3