Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-28319
HistoryMay 26, 2023 - 9:15 p.m.

CVE-2023-28319

2023-05-2621:15:10
Debian Security Bug Tracker
security-tracker.debian.org
38
vulnerability
use after free
curl
ssh server
public key
verification
heap-based data
error message
memory
leak
revealed
unix

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.002

Percentile

62.5%

A use after free vulnerability exists in curl <v8.1.0 in the way libcurl offers a feature to verify an SSH serverโ€™s public key using a SHA 256 hash. When this check fails, libcurl would free the memory for the fingerprint before it returns an error message containing the (now freed) hash. This flaw risks inserting sensitive heap-based data into the error message that might be shown to users or otherwise get leaked and revealed.

OSVersionArchitecturePackageVersionFilename
Debian12allcurl<ย 7.88.1-10curl_7.88.1-10_all.deb
Debian11allcurl<ย 7.74.0-1.3+deb11u13curl_7.74.0-1.3+deb11u13_all.deb
Debian999allcurl<ย 7.88.1-10curl_7.88.1-10_all.deb
Debian13allcurl<ย 7.88.1-10curl_7.88.1-10_all.deb

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.002

Percentile

62.5%