Updated: 2024-03-27 20:23:26.151389
Description:
An allocation of resources without limits or throttling vulnerability exists in curl <v7.88.0 based on the "chained" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable "links" in this "decompression chain" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a "malloc bomb", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.
Links | NIST | CIRCL | RHEL | Ubuntu |
Severity | Score | |
---|---|---|
CVSS Version 2.x | 0 | |
CVSS Version 3.x | MEDIUM | 6.5 |
OS name | Project name | Version | Score | Severity | Status | Errata | Last updated |
---|---|---|---|---|---|---|---|
AlmaLinux 9.2 ESU | curl | 7.76.1 | 6.5 | MEDIUM | Ignored | 2023-11-08 04:08:00 | |
CentOS 8.4 ELS | curl | 7.61.1 | 6.5 | MEDIUM | Released | CLSA-2023:1679349850 | 2023-03-20 21:14:00 |
CentOS 8.5 ELS | curl | 7.61.1 | 6.5 | MEDIUM | Released | CLSA-2023:1679350332 | 2023-03-20 21:14:00 |
Ubuntu 18.04 ELS | curl | 7.58.0-2 | 6.5 | MEDIUM | Already Fixed | 2023-11-06 08:42:17 |