QID 378999
QID 378999: Curl Heap Buffer Overflow Vulnerability
Curl is a command-line tool to transfer data to or from a server, using any of the supported protocols (HTTP, FTP, IMAP, POP3, SCP, SFTP, SMTP, TFTP, TELNET, LDAP, or FILE). curl is powered by Libcurl.
CVE-2023-38545:This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake.
Affected Versions:
libcurl from 7.69.0 till 8.3.0
QID Detection Logic:(Authenticated)
This QID checks the vulnerable version of curl.
QID Detection Logic (Authenticated):
We are checking the vulnerable version of curl at default paths using locate command
Successful exploitation makes curl overflow a heap based buffer in the SOCKS5 proxy handshake and also allows an attacker to insert cookies at will into a running program using libcurl.
curl has released fix to address this issue. Customers are advised to refer to CVE-2023-38545 for updates pertaining to this vulnerability.
- CVE-2023-38545 -
curl.se/docs/CVE-2023-38545.html
CVEs related to QID 378999
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| CVE-2023-38545 |
|