CVE-2023-28320Uncontrolled Resource Consumption in Curl

Severity
5.9MEDIUMNVD
EPSS
0.5%
top 32.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 26
Latest updateJul 24

Description

A denial of service vulnerability exists in curl <v8.1.0 in the way libcurl provides several different backends for resolving host names, selected at build time. If it is built to use the synchronous resolver, it allows name resolves to time-out slow operations using `alarm()` and `siglongjmp()`. When doing this, libcurl used a global buffer that was not mutex protected and a multi-threaded application might therefore crash or otherwise misbehave.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.2 | Impact: 3.6

Affected Packages4 packages

NVDhaxx/curl< 8.1.0
Debianhaxx/curl< 7.88.1-10+2
CVEListV5https/github.com_curl_curlFixed in 8.1.0
NVDapple/macos11.011.7.9+2

Patches

🔴Vulnerability Details

3
OSV
CVE-2023-28320: A denial of service vulnerability exists in curl <v82023-05-26
GHSA
GHSA-c8wj-435x-f2cc: A denial of service vulnerability exists in curl <v82023-05-26
CVEList
CVE-2023-28320: A denial of service vulnerability exists in curl <v82023-05-26

📋Vendor Advisories

6
Apple
CVE-2023-28320: macOS Big Sur 11.7.92023-07-24
Apple
CVE-2023-28320: macOS Ventura 13.52023-07-24
Apple
CVE-2023-28320: macOS Monterey 12.6.82023-07-24
Red Hat
curl: siglongjmp race condition may lead to crash2023-05-17
Microsoft
A denial of service vulnerability exists in curl <v8.1.0 in the way libcurl provides several different backends for resolving host names selected at build time. If it is built to use the synchronous r2023-05-09

💬Community

2
HackerOne
CVE-2023-28320 - siglongjmp race condition2023-05-26
HackerOne
CVE-2023-28320: siglongjmp race condition2023-05-17
CVE-2023-28320 — Uncontrolled Resource Consumption | cvebase