CVE-2023-28319

A use after free vulnerability exists in curl <v8.1.0 in the way libcurl offers a feature to verify an SSH server's public key using a SHA 256 hash. When this check fails, libcurl would free the memory for the fingerprint before it returns an error message containing the (now freed) hash. This flaw risks inserting sensitive heap-based data into the error message that might be shown to users or otherwise get leaked and revealed.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
hackeroneCNA
---
---
CVEADP
---
---
CISA-ADPADP
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 54%
VendorProductVersion
haxxcurl
𝑥
< 8.1.0
applemacos
11.0 ≤
𝑥
< 11.7.9
applemacos
12.0 ≤
𝑥
< 12.6.8
applemacos
13.0 ≤
𝑥
< 13.5
netappclustered_data_ontap
-
netappontap_antivirus_connector
-
netapph300s_firmware
-
netapph500s_firmware
-
netapph700s_firmware
-
netapph410s_firmware
-
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
curl
bullseye
7.74.0-1.3+deb11u13
not-affected
buster
not-affected
bullseye (security)
7.74.0-1.3+deb11u14
fixed
bookworm
7.88.1-10+deb12u8
fixed
bookworm (security)
7.88.1-10+deb12u5
fixed
trixie
8.11.1-1
fixed
sid
8.11.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
curl
lunar
not-affected
kinetic
not-affected
jammy
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected