3.7 Low
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
0.001 Low
EPSS
Percentile
48.2%
libcurl.so is vulnerable to Use After Free. Even when the CURLOPT_POSTFIELDS
option is enabled, libcurl may mistakenly use the read callback (CURLOPT_READFUNCTION
) while performing HTTP(S) transfers to request data to send. The application might misbehave and send the incorrect data or use memory that is no longer available as a result of this bug. The issue arises when it is anticipated that a reused handle will be converted from a PUT to a POST.
seclists.org/fulldisclosure/2023/Jul/47
seclists.org/fulldisclosure/2023/Jul/48
seclists.org/fulldisclosure/2023/Jul/52
curl.se/docs/CVE-2023-28322.html
github.com/curl/curl/commit/7815647d6582c0a4900be2e1de6c5e61272c496b
github.com/curl/curl/pull/11017
hackerone.com/reports/1954658
lists.debian.org/debian-lts-announce/2023/12/msg00015.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
lists.fedoraproject.org/archives/list/[email protected]/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
lists.fedoraproject.org/archives/list/[email protected]/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
security.gentoo.org/glsa/202310-12
security.netapp.com/advisory/ntap-20230609-0009/
support.apple.com/kb/HT213843
support.apple.com/kb/HT213844
support.apple.com/kb/HT213845