Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-27533
HistoryMar 20, 2023 - 12:00 a.m.

CVE-2023-27533

2023-03-2000:00:00
ubuntu.com
ubuntu.com
36
cve-2023-27533
communication
telnet
maliciously crafted user name
server negotiation
input scrubbing
content
option negotiation
arbitrary code
unix

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

57.8%

A vulnerability in input validation exists in curl <8.0 during
communication using the TELNET protocol may allow an attacker to pass on
maliciously crafted user name and “telnet options” during server
negotiation. The lack of proper input scrubbing allows an attacker to send
content or perform option negotiation without the application’s intent.
This vulnerability could be exploited if an application allows user input,
thereby enabling attackers to execute arbitrary code on the system.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchcurl< 7.58.0-2ubuntu3.24UNKNOWN
ubuntu20.04noarchcurl< 7.68.0-1ubuntu2.18UNKNOWN
ubuntu22.04noarchcurl< 7.81.0-1ubuntu1.10UNKNOWN
ubuntu22.10noarchcurl< 7.85.0-1ubuntu0.5UNKNOWN
ubuntu23.04noarchcurl< 7.88.1-6ubuntu2UNKNOWN
ubuntu14.04noarchcurl< 7.35.0-1ubuntu2.20+esm15UNKNOWN
ubuntu16.04noarchcurl< 7.47.0-1ubuntu2.19+esm8UNKNOWN

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

57.8%