Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-28319
HistoryMay 17, 2023 - 12:00 a.m.

CVE-2023-28319

2023-05-1700:00:00
ubuntu.com
ubuntu.com
20

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

48.1%

A use after free vulnerability exists in curl <v8.1.0 in the way libcurl
offers a feature to verify an SSH serverโ€™s public key using a SHA 256 hash.
When this check fails, libcurl would free the memory for the fingerprint
before it returns an error message containing the (now freed) hash. This
flaw risks inserting sensitive heap-based data into the error message that
might be shown to users or otherwise get leaked and revealed.

Notes

Author Note
mdeslaur introduced in 7.81.0 in https://github.com/curl/curl/commit/3467e89bb97e6c87c7 This only affects curl when built with libssh2. Ubuntu packages contain a delta from debian to build with libssh instead of libssh2, so Ubuntu is not affected by this vulnerability.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

48.1%