Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-23916

Опубликовано: 15 фев. 2023
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

An allocation of resources without limits or throttling vulnerability exists in curl <v7.88.0 based on the "chained" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable "links" in this "decompression chain" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a "malloc bomb", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.

A flaw was found in the Curl package. A malicious server can insert an unlimited number of compression steps. This decompression chain could result in out-of-memory errors.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
.NET Core 3.1 on Red Hat Enterprise Linuxrh-dotnet31-curlOut of support scope
Red Hat Enterprise Linux 6curlOut of support scope
Red Hat Enterprise Linux 7curlNot affected
Red Hat Enterprise Linux 8curlFixedRHSA-2023:114007.03.2023
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportcurlFixedRHSA-2023:346006.06.2023
Red Hat Enterprise Linux 8.4 Telecommunications Update ServicecurlFixedRHSA-2023:346006.06.2023
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionscurlFixedRHSA-2023:346006.06.2023
Red Hat Enterprise Linux 8.6 Extended Update SupportcurlFixedRHSA-2023:184218.04.2023
Red Hat Enterprise Linux 9curlFixedRHSA-2023:170111.04.2023
Red Hat Enterprise Linux 9curlFixedRHSA-2023:170111.04.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-770
https://bugzilla.redhat.com/show_bug.cgi?id=2167815curl: HTTP multi-header compression denial of service

EPSS

Процентиль: 16%
0.00051
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 2 лет назад

An allocation of resources without limits or throttling vulnerability exists in curl <v7.88.0 based on the "chained" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable "links" in this "decompression chain" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a "malloc bomb", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.

CVSS3: 6.5
nvd
больше 2 лет назад

An allocation of resources without limits or throttling vulnerability exists in curl <v7.88.0 based on the "chained" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable "links" in this "decompression chain" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a "malloc bomb", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.

CVSS3: 6.5
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 6.5
debian
больше 2 лет назад

An allocation of resources without limits or throttling vulnerability ...

suse-cvrf
больше 2 лет назад

Security update for curl

EPSS

Процентиль: 16%
0.00051
Низкий

6.5 Medium

CVSS3

Уязвимость CVE-2023-23916