CVE-2023-38545: Heap buffer overflow in curl SOCKS5 handshak
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | libcurl 7.69 < 8.4.0 Heap Buffer Overflow | 11 Oct 202300:00 | – | nessus |
![]() | Curl 7.69 < 8.4.0 Heap Buffer Overflow | 11 Oct 202300:00 | – | nessus |
![]() | FreeBSD : curl -- SOCKS5 heap buffer overflow (d6c19e8c-6806-11ee-9464-b42e991fc52e) | 11 Oct 202300:00 | – | nessus |
![]() | CentOS 9 : curl-7.76.1-28.el9 | 29 Feb 202400:00 | – | nessus |
![]() | RHEL 6 / 7 / 8 / 9 : Satellite Client Async Security Update (Important) (RHSA-2024:2011) | 24 Apr 202400:00 | – | nessus |
![]() | EulerOS 2.0 SP10 : curl (EulerOS-SA-2024-1079) | 16 Jan 202400:00 | – | nessus |
![]() | EulerOS 2.0 SP11 : curl (EulerOS-SA-2023-3267) | 16 Jan 202400:00 | – | nessus |
![]() | EulerOS Virtualization 2.9.0 : curl (EulerOS-SA-2024-1005) | 16 Jan 202400:00 | – | nessus |
![]() | TensorFlow < 2.14.1 Multiple Vulnerabilities | 16 May 202400:00 | – | nessus |
![]() | RHEL 9 : curl (RHSA-2023:5763) | 17 Oct 202300:00 | – | nessus |
[
{
"vendor": "curl",
"product": "curl",
"versions": [
{
"version": "8.4.0",
"status": "affected",
"lessThan": "8.4.0",
"versionType": "semver"
},
{
"version": "7.69.0",
"status": "unaffected",
"lessThan": "7.69.0",
"versionType": "semver"
}
]
}
]
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
host name | query param | http://localhost:8000 | Exploited URL that causes heap overflow due to long host name being passed. | CWE-787 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo