cve/2023/CVE-2023-28320.md

20 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-28320](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28320)
![](https://img.shields.io/static/v1?label=Product&message=https%3A%2F%2Fgithub.com%2Fcurl%2Fcurl&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Denial%20of%20Service%20(CWE-400)&color=brighgreen)
### Description
A denial of service vulnerability exists in curl <v8.1.0 in the way libcurl provides several different backends for resolving host names, selected at build time. If it is built to use the synchronous resolver, it allows name resolves to time-out slow operations using `alarm()` and `siglongjmp()`. When doing this, libcurl used a global buffer that was not mutex protected and a multi-threaded application might therefore crash or otherwise misbehave.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/awest25/Curl-Security-Evaluation
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/jp-cpe/retrieve-cvss-scores