Lucene search

K
cveHackeroneCVE-2022-32206
HistoryJul 07, 2022 - 1:15 p.m.

CVE-2022-32206

2022-07-0713:15:08
CWE-770
hackerone
web.nvd.nist.gov
205
12
cve-2022-32206
curl
http compression
security vulnerability
malloc bomb
nvd

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

AI Score

7.9

Confidence

High

EPSS

0.002

Percentile

59.1%

curl < 7.84.0 supports “chained” HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable “links” in this “decompression chain” was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a “malloc bomb”, makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.

Affected configurations

Nvd
Vulners
Node
haxxcurlRange<7.84.0
Node
fedoraprojectfedoraMatch35
Node
debiandebian_linuxMatch10.0
OR
debiandebian_linuxMatch11.0
Node
netappclustered_data_ontapMatch-
OR
netappelement_softwareMatch-
OR
netapphci_management_nodeMatch-
OR
netappsolidfireMatch-
Node
netapphci_compute_nodeMatch-
AND
netappbootstrap_osMatch-
Node
netapph300sMatch-
AND
netapph300s_firmwareMatch-
Node
netapph500sMatch-
AND
netapph500s_firmwareMatch-
Node
netapph700sMatch-
AND
netapph700s_firmwareMatch-
Node
netapph410sMatch-
AND
netapph410s_firmwareMatch-
Node
siemensscalance_sc622-2cMatch-
AND
siemensscalance_sc622-2c_firmwareRange<3.0
Node
siemensscalance_sc626-2cMatch-
AND
siemensscalance_sc626-2c_firmwareRange<3.0
Node
siemensscalance_sc632-2c_firmwareRange<3.0
AND
siemensscalance_sc632-2cMatch-
Node
siemensscalance_sc636-2c_firmwareRange<3.0
AND
siemensscalance_sc636-2cMatch-
Node
siemensscalance_sc642-2c_firmwareRange<3.0
AND
siemensscalance_sc642-2cMatch-
Node
siemensscalance_sc646-2c_firmwareRange<3.0
AND
siemensscalance_sc646-2cMatch-
Node
splunkuniversal_forwarderRange8.2.08.2.12
OR
splunkuniversal_forwarderRange9.0.09.0.6
OR
splunkuniversal_forwarderMatch9.1.0
VendorProductVersionCPE
haxxcurl*cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
fedoraprojectfedora35cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
debiandebian_linux10.0cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
debiandebian_linux11.0cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
netappclustered_data_ontap-cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
netappelement_software-cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
netapphci_management_node-cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
netappsolidfire-cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
netapphci_compute_node-cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*
netappbootstrap_os-cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 321

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "https://github.com/curl/curl",
    "versions": [
      {
        "version": "Fixed in 7.84.0",
        "status": "affected"
      }
    ]
  }
]

Social References

More

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

AI Score

7.9

Confidence

High

EPSS

0.002

Percentile

59.1%