Use After Free Affecting curl package, versions [7.81.0,8.1.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.25% (65th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use After Free vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-CURL-5561965
  • published18 May 2023
  • disclosed17 May 2023
  • creditWei Chong Tan

Introduced: 17 May 2023

CVE-2023-28319  (opens in a new tab)
CWE-416  (opens in a new tab)

How to fix?

Upgrade curl to version 8.1.0 or higher.

Overview

curl is a command line tool and library for transferring data with URL syntax, supporting DICT, FILE, FTP, FTPS, GOPHER, GOPHERS, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, MQTT, POP3, POP3S, RTMP, RTMPS, RTSP, SCP, SFTP, SMB, SMBS, SMTP, SMTPS, TELNET and TFTP. libcurl offers a myriad of powerful features.

Affected versions of this package are vulnerable to Use After Free sha256 public key fingerprint verification. When the CURLOPT_SSH_HOST_PUBLIC_KEY_SHA256 option and either of the CURLOPT_VERBOSE or CURLOPT_ERRORBUFFER options are enabled, up to 186 bytes of heap memory (or up to the first null byte) can be leaked into error message output. If timed precisely, an attacker can cause such memory to be freed before the error is generated.

Workaround

This vulnerability can be avoided by not using CURLOPT_SSH_HOST_PUBLIC_KEY_SHA256.

CVSS Scores

version 3.1