CVE-2023-38545
Severity
9.8CRITICAL
EPSS
26.3%
top 3.70%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 18
Latest updateOct 22
Description
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy
handshake.
When curl is asked to pass along the host name to the SOCKS5 proxy to allow
that to resolve the address instead of it getting done by curl itself, the
maximum length that host name can be is 255 bytes.
If the host name is detected to be longer, curl switches to local name
resolving and instead passes on the resolved address only. Due to this bug,
the local variable that means "let the host resolve the name" could …
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages13 packages
Also affects: Fedora 37
Patches
🔴Vulnerability Details
8OSV▶
CVE-2023-38545: This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake↗2023-10-18
CVEList▶
CVE-2023-38545: This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy
handshake↗2023-10-18
OSV▶
CVE-2023-38545: This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy
handshake↗2023-10-18
🔍Detection Rules
1📋Vendor Advisories
14Oracle▶
Oracle Oracle Database Server Risk Matrix: Oracle Spatial and Graph (curl) — CVE-2023-38545↗2024-01-15