CVE-2023-38545

EUVD-2023-42344
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy
handshake.

When curl is asked to pass along the host name to the SOCKS5 proxy to allow
that to resolve the address instead of it getting done by curl itself, the
maximum length that host name can be is 255 bytes.

If the host name is detected to be longer, curl switches to local name
resolving and instead passes on the resolved address only. Due to this bug,
the local variable that means "let the host resolve the name" could get the
wrong value during a slow SOCKS5 handshake, and contrary to the intention,
copy the too long host name to the target buffer instead of copying just the
resolved address there.

The target buffer being a heap based buffer, and the host name coming from the
URL that curl has been told to operate with.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA-ADPADP
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 96%
Affected Products (NVD)
VendorProductVersion
haxxlibcurl
7.69.0 ≤
𝑥
< 8.4.0
netappactive_iq_unified_manager
-
netappactive_iq_unified_manager
-
netapponcommand_insight
-
netapponcommand_workflow_automation
-
microsoftwindows_10_1809
𝑥
< 10.0.17763.5122
microsoftwindows_10_21h2
𝑥
< 10.0.19044.3693
microsoftwindows_10_22h2
𝑥
< 10.0.19045.3693
microsoftwindows_11_21h2
𝑥
< 10.0.22000.2600
microsoftwindows_11_22h2
𝑥
< 10.0.22621.2715
microsoftwindows_11_23h2
𝑥
< 10.0.22631.2715
microsoftwindows_server_2019
𝑥
< 10.0.17763.5122
microsoftwindows_server_2022
𝑥
< 10.0.20348.2113
𝑥
= Vulnerable software versions
Windows Releases
Platform
Version
Windows 10
1809 (arm64, x64, x86)
21H2 (arm64, x64)
21H2 (x86)
22H2 (arm64, x64, x86)
Windows 11
21H2 (arm64, x64)
22H2 (arm64, x64)
23H2 (arm64, x64)
Windows Server 2019
Server Core
Standard
Windows Server 2022
Server Core
Standard
Debian logo
Debian Releases
Debian Product
Codename
curl
bookworm
7.88.1-10+deb12u8
fixed
bookworm (security)
7.88.1-10+deb12u5
fixed
bullseye
7.74.0-1.3+deb11u13
fixed
bullseye (security)
7.74.0-1.3+deb11u14
fixed
buster
not-affected
sid
8.11.1-1
fixed
trixie
8.11.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
curl
bionic
not-affected
focal
not-affected
jammy
Fixed 7.81.0-1ubuntu1.14
released
lunar
Fixed 7.88.1-8ubuntu2.3
released
mantic
Fixed 8.2.1-1ubuntu3.1
released
noble
Fixed 8.2.1-1ubuntu3.1
released
trusty
not-affected
xenial
not-affected
References