CVE-2023-38039

When curl retrieves an HTTP response, it stores the incoming headers so that
they can be accessed later via the libcurl headers API.

However, curl did not have a limit in how many or how large headers it would
accept in a response, allowing a malicious server to stream an endless series
of headers and eventually cause curl to run out of heap memory.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
hackeroneCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 94%
VendorProductVersion
haxxcurl
7.84.0 ≤
𝑥
< 8.3.0
microsoftwindows_10_1809
𝑥
< 10.0.17763.5122
microsoftwindows_10_21h2
𝑥
< 10.0.19044.3693
microsoftwindows_10_22h2
𝑥
< 10.0.19045.3693
microsoftwindows_11_21h2
𝑥
< 10.0.22000.2600
microsoftwindows_11_22h2
𝑥
< 10.0.22621.2715
microsoftwindows_11_23h2
𝑥
< 10.0.22631.2715
microsoftwindows_server_2019
𝑥
< 10.0.17763.5122
microsoftwindows_server_2022
𝑥
< 10.0.20348.2113
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
curl
bullseye
7.74.0-1.3+deb11u13
not-affected
buster
not-affected
bullseye (security)
7.74.0-1.3+deb11u14
fixed
bookworm
7.88.1-10+deb12u8
fixed
bookworm (security)
7.88.1-10+deb12u5
fixed
sid
8.11.1-1
fixed
trixie
8.11.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
curl
noble
Fixed 8.2.1-1ubuntu3
released
mantic
Fixed 8.2.1-1ubuntu3
released
lunar
Fixed 7.88.1-8ubuntu2.2
released
jammy
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected
References