8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
6.2 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
10.5%
libcurl is vulnerable to a Memory Leakage. The vulnerability is due to the improper handling of HTTP/2 server push requests, allows server push and the number of received headers exceeds the maximum limit.
www.openwall.com/lists/oss-security/2024/03/27/3
curl.se/docs/CVE-2024-2398.html
curl.se/docs/CVE-2024-2398.json
hackerone.com/reports/2402845
lists.fedoraproject.org/archives/list/[email protected]/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/
lists.fedoraproject.org/archives/list/[email protected]/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/
security-tracker.debian.org/tracker/CVE-2024-2398
security.netapp.com/advisory/ntap-20240503-0009/
8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
6.2 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
10.5%