CVE-2023-38039
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
15/09/2023
Last modified:
01/04/2024
Description
When curl retrieves an HTTP response, it stores the incoming headers so that<br />
they can be accessed later via the libcurl headers API.<br />
<br />
However, curl did not have a limit in how many or how large headers it would<br />
accept in a response, allowing a malicious server to stream an endless series<br />
of headers and eventually cause curl to run out of heap memory.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* | 7.84.0 (including) | 8.3.0 (excluding) |
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:* | 10.0.17763.5122 (excluding) | |
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:* | 10.0.19044.3693 (excluding) | |
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:* | 10.0.19045.3693 (excluding) | |
cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:* | 10.0.22000.2600 (excluding) | |
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:* | 10.0.22621.2715 (excluding) | |
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:* | 10.0.22631.2715 (excluding) | |
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* | 10.0.17763.5122 (excluding) | |
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:* | 10.0.20348.2113 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://seclists.org/fulldisclosure/2023/Oct/17
- http://seclists.org/fulldisclosure/2024/Jan/34
- http://seclists.org/fulldisclosure/2024/Jan/37
- http://seclists.org/fulldisclosure/2024/Jan/38
- https://hackerone.com/reports/2072338
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/
- https://security.gentoo.org/glsa/202310-12
- https://security.netapp.com/advisory/ntap-20231013-0005/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214057
- https://support.apple.com/kb/HT214058
- https://support.apple.com/kb/HT214063
- https://www.insyde.com/security-pledge/SA-2023064