Lucene search

K
redosRedosROS-20221222-02
HistoryDec 22, 2022 - 12:00 a.m.

ROS-20221222-02

2022-12-2200:00:00
redos.red-soft.ru
27
curl
vulnerability
.netrc
buffer overflow
dos
http
put
post
logical error
unix

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.007 Low

EPSS

Percentile

79.8%

A vulnerability in the cURL command-line utility is related to a bounds error in parsing the .netrc file. Exploitation
vulnerability could allow an attacker acting remotely to transfer a specially crafted file,
cause a stack-based buffer overflow, and perform a denial of service (DoS) attack

The cURL command-line utility vulnerability is related to a logical error in the reused descriptor
when processing subsequent HTTP PUT and POST requests. Exploitation of the vulnerability could allow an attacker,
acting remotely, use a read callback (CURLOPT_READFUNCTION) to request data
to be sent and cause unpredictable results

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64curl<=ย 7.81.0-7UNKNOWN

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.007 Low

EPSS

Percentile

79.8%