CVE-2020-8231Use After Free in Libcurl

Severity
7.5HIGHNVD
EPSS
0.2%
top 63.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 14
Latest updateMay 24

Description

Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages7 packages

NVDhaxx/libcurl7.29.07.71.1
NVDsplunk/universal_forwarder8.2.08.2.12+2
Debianhaxx/curl< 7.72.0-1+3
Ubuntuhaxx/curl< 7.47.0-1ubuntu2.18+2

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

4
GHSA
GHSA-xp52-49j5-h754: Due to use of a dangling pointer, libcurl 72022-05-24
OSV
CVE-2020-8231: Due to use of a dangling pointer, libcurl 72020-12-14
CVEList
CVE-2020-8231: Due to use of a dangling pointer, libcurl 72020-12-14
OSV
curl vulnerabilities2020-12-09

📋Vendor Advisories

7
Oracle
Oracle Oracle Communications Risk Matrix: Policy (libcurl) — CVE-2020-82312022-04-15
Ubuntu
curl vulnerabilities2020-12-09
Microsoft
Due to use of a dangling pointer libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.2020-12-08
Ubuntu
curl vulnerability2020-08-20
Ubuntu
curl vulnerability2020-08-19

💬Community

4
HackerOne
CVE-2020-8231: Connect-only connections can use the wrong connection2020-11-05
Bugzilla
CVE-2020-8231 curl: Expired pointer dereference via multi API with `CURLOPT_CONNECT_ONLY` option set [fedora-all]2020-08-19
Bugzilla
CVE-2020-8231 mingw-curl: curl: Expired pointer dereference via multi API with `CURLOPT_CONNECT_ONLY` option set [fedora-all]2020-08-19
Bugzilla
CVE-2020-8231 curl: Expired pointer dereference via multi API with CURLOPT_CONNECT_ONLY option set2020-08-11
CVE-2020-8231 — Use After Free in Haxx Libcurl | cvebase