QID 378936

Date Published: 2023-11-03

QID 378936: Microsoft Windows Curl Multiple Security Vulnerabilities

Curl is a command-line tool to transfer data to or from a server, using any of the supported protocols (HTTP, FTP, IMAP, POP3, SCP, SFTP, SMTP, TFTP, TELNET, LDAP, or FILE). curl is powered by Libcurl.

CVE-2023-38545:This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake.
CVE-2023-38546:This flaw allows an attacker to insert cookies at will into a running program using libcurl, if the specific series of conditions are met.

Affected Versions:
CVE-2023-38545:libcurl from 7.69.0 till 8.3.0
CVE-2023-38546:libcurl from 7.9.1 till 8.3.0

QID Detection Logic:(Authenticated)
This QID checks the vulnerable version of libcurl. QID Detection Logic (Authenticated):
We are checking the vulnerable version of curl at default paths C:\Windows\SysWOW64\curl.exe and C:\Windows\System32\curl.exe

Successful exploitation makes curl overflow a heap based buffer in the SOCKS5 proxy handshake and also allows an attacker to insert cookies at will into a running program using libcurl.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 9.3 severity.
  • Solution

    curl has released fix to address this issue. Customers are advised to refer to CVE-2023-38545 for updates pertaining to this vulnerability.

    CVEs related to QID 378936

    Software Advisories
    Advisory ID Software Component Link