Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-23916
HistoryFeb 15, 2023 - 12:00 a.m.

CVE-2023-23916

2023-02-1500:00:00
ubuntu.com
ubuntu.com
27
'cve-2023-23916' 'curl vulnerability' 'http compression' 'resource exhaustion' 'memory allocation' 'security risk' 'unix'

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

53.4%

An allocation of resources without limits or throttling vulnerability
exists in curl <v7.88.0 based on the โ€œchainedโ€ HTTP compression algorithms,
meaning that a server response can be compressed multiple times and
potentially with differentalgorithms. The number of acceptable โ€œlinksโ€ in
this โ€œdecompression chainโ€ wascapped, but the cap was implemented on a
per-header basis allowing a maliciousserver to insert a virtually unlimited
number of compression steps simply byusing many headers. The use of such a
decompression chain could result in a โ€œmalloc bombโ€, making curl end up
spending enormous amounts of allocated heap memory, or trying to and
returning out of memory errors.

Notes

Author Note
mdeslaur introduced in 7.57.0
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchcurl<ย 7.58.0-2ubuntu3.23UNKNOWN
ubuntu20.04noarchcurl<ย 7.68.0-1ubuntu2.16UNKNOWN
ubuntu22.04noarchcurl<ย 7.81.0-1ubuntu1.8UNKNOWN
ubuntu22.10noarchcurl<ย 7.85.0-1ubuntu0.3UNKNOWN
ubuntu23.04noarchcurl<ย 7.87.0-2ubuntu1UNKNOWN

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

53.4%