Lucene search

K
redosRedosROS-20230621-04
HistoryJun 21, 2023 - 12:00 a.m.

ROS-20230621-04

2023-06-2100:00:00
redos.red-soft.ru
15
curl
certificate validation
hostname resolution
ssh
fingerprint
http request
vulnerability
remote
exploitation
unauthorized access

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.002

Percentile

62.5%

A vulnerability in the curl program is related to incorrect certificate validation when matching wildcards in TLS certificates for IDNs.
wildcards in TLS certificates for IDNs. Exploitation of the vulnerability could allow an attacker acting remotely to create a specially crafted certificate that the library would consider trusted.
remotely to create a specially crafted certificate that the library would consider trusted.

A vulnerability in the curl program is related to improper synchronization when resolving hostnames using the
alarm() and siglongjmp() functions.Exploitation of the vulnerability could allow an attacker acting remotely to cause the application to crash.
An exploitation of the vulnerability could allow an attacker acting remotely to cause an application crash by affecting the contents of the global buffer.

The curl program vulnerability is related to a post-release usage error in SSH fingerprint validation
sha256. Exploitation of the vulnerability could allow an attacker acting remotely to use the
application to connect to a malicious SSH server, cause a post-release exploit error, and
gain access to potentially sensitive information.

The libcurl library vulnerability involves errors when sending POST and PUT HTTP requests using the
the same descriptor. Exploitation of the vulnerability could allow a remote attacker,
gain unauthorized access to protected information

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64curl< 7.81.0-10UNKNOWN

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.002

Percentile

62.5%