Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-23916

Опубликовано: 15 фев. 2023
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

An allocation of resources without limits or throttling vulnerability exists in curl <v7.88.0 based on the "chained" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable "links" in this "decompression chain" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a "malloc bomb", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.

A flaw was found in the Curl package. A malicious server can insert an unlimited number of compression steps. This decompression chain could result in out-of-memory errors.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
.NET Core 3.1 on Red Hat Enterprise Linuxrh-dotnet31-curlOut of support scope
Red Hat Enterprise Linux 6curlOut of support scope
Red Hat Enterprise Linux 7curlNot affected
JBCS httpd 2.4.51.sp2jbcs-httpd24-curlFixedRHSA-2023:335505.06.2023
JBoss Core Services for RHEL 8jbcs-httpd24-curlFixedRHSA-2023:335405.06.2023
JBoss Core Services on RHEL 7jbcs-httpd24-curlFixedRHSA-2023:335405.06.2023
Red Hat Enterprise Linux 8curlFixedRHSA-2023:114007.03.2023
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportcurlFixedRHSA-2023:346006.06.2023
Red Hat Enterprise Linux 8.4 Telecommunications Update ServicecurlFixedRHSA-2023:346006.06.2023
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionscurlFixedRHSA-2023:346006.06.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-770
https://bugzilla.redhat.com/show_bug.cgi?id=2167815curl: HTTP multi-header compression denial of service

EPSS

Процентиль: 19%
0.0006
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
почти 3 года назад

An allocation of resources without limits or throttling vulnerability exists in curl <v7.88.0 based on the "chained" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable "links" in this "decompression chain" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a "malloc bomb", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.

CVSS3: 6.5
nvd
почти 3 года назад

An allocation of resources without limits or throttling vulnerability exists in curl <v7.88.0 based on the "chained" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable "links" in this "decompression chain" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a "malloc bomb", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.

CVSS3: 6.5
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 6.5
debian
почти 3 года назад

An allocation of resources without limits or throttling vulnerability ...

suse-cvrf
почти 3 года назад

Security update for curl

EPSS

Процентиль: 19%
0.0006
Низкий

6.5 Medium

CVSS3