Lucene search

K
freebsdFreeBSDD6C19E8C-6806-11EE-9464-B42E991FC52E
HistorySep 30, 2023 - 12:00 a.m.

curl -- SOCKS5 heap buffer overflow

2023-09-3000:00:00
vuxml.freebsd.org
19
curl
socks5
buffer overflow
proxy handshake
hostname
heap
bug
variable
resolved address

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

70.6%

The curl team reports:

This flaw makes curl overflow a heap based buffer in the
SOCKS5 proxy handshake. When curl is asked to pass along
the hostname to the SOCKS5 proxy to allow that to resolve
the address instead of it getting done by curl itself, the
maximum length that hostname can be is 255 bytes. If the
hostname is detected to be longer than 255 bytes, curl
switches to local name resolving and instead passes on the
resolved address only to the proxy. Due to a bug, the
local variable that means “let the host resolve the name”
could get the wrong value during a slow SOCKS5 handshake,
and contrary to the intention, copy the too long hostname
to the target buffer instead of copying just the resolved
address there.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchcurl< 8.4.0UNKNOWN
FreeBSDanynoarchcmake-core< 3.27.8UNKNOWN

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

70.6%