Описание
libcurl's ASN1 parser code has the GTime2str()
function, used for parsing an
ASN.1 Generalized Time field. If given an syntactically incorrect field, the
parser might end up using -1 for the length of the time fraction, leading to
a strlen()
getting performed on a pointer to a heap buffer area that is not
(purposely) null terminated.
This flaw most likely leads to a crash, but can also lead to heap contents
getting returned to the application when
CURLINFO_CERTINFO is used.
A flaw was found in libcurl, where libcurl's ASN1 parser code has the GTime2str()
function, used for parsing an ASN.1 Generalized Time field. If a syntactically incorrect field is given, the parser can use -1 for the length of the time fraction, leading to a strlen()
performed on a pointer to a heap buffer area that is not purposely NULL terminated.
Отчет
The vulnerability is classified as low severity because it primarily results in a heap buffer over-read rather than a direct memory corruption or code execution risk. Since the ASN.1 parsing occurs after a successful TLS handshake, the malformed certificate must first bypass the TLS library's validation, which significantly reduces the likelihood of exploitation. Additionally, the impact is limited to a potential crash or unintended heap data exposure through CURLINFO_CERTINFO, but not arbitrary code execution. The requirement for a specific TLS backend configuration and the controlled nature of the memory read further minimize its exploitability.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 10 | curl | Fix deferred | ||
Red Hat Enterprise Linux 10 | mysql8.4 | Affected | ||
Red Hat Enterprise Linux 6 | curl | Fix deferred | ||
Red Hat Enterprise Linux 6 | mysql | Not affected | ||
Red Hat Enterprise Linux 7 | curl | Fix deferred | ||
Red Hat Enterprise Linux 8 | curl | Will not fix | ||
Red Hat Enterprise Linux 9 | curl | Fix deferred | ||
Red Hat JBoss Core Services | curl | Fix deferred | ||
Red Hat OpenShift Container Platform 4 | rhcos | Fix deferred | ||
Red Hat Software Collections | rh-mysql80-mysql | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
5.3 Medium
CVSS3
Связанные уязвимости
libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect field, the parser might end up using -1 for the length of the *time fraction*, leading to a `strlen()` getting performed on a pointer to a heap buffer area that is not (purposely) null terminated. This flaw most likely leads to a crash, but can also lead to heap contents getting returned to the application when [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used.
libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect field, the parser might end up using -1 for the length of the *time fraction*, leading to a `strlen()` getting performed on a pointer to a heap buffer area that is not (purposely) null terminated. This flaw most likely leads to a crash, but can also lead to heap contents getting returned to the application when [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used.
libcurl's ASN1 parser code has the `GTime2str()` function, used for pa ...
EPSS
5.3 Medium
CVSS3