2023-03-14 02:00:34 +00:00
{
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"data_version" : "4.0" ,
"CVE_data_meta" : {
"ID" : "CVE-2023-28320" ,
2023-05-26 21:00:38 +00:00
"ASSIGNER" : "support@hackerone.com" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "n/a" ,
"product" : {
"product_data" : [
{
"product_name" : "https://github.com/curl/curl" ,
"version" : {
"version_data" : [
{
"version_value" : "Fixed in 8.1.0"
}
]
}
}
]
}
}
]
}
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "Denial of Service (CWE-400)"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"refsource" : "MISC" ,
"name" : "https://hackerone.com/reports/1929597" ,
"url" : "https://hackerone.com/reports/1929597"
2023-06-09 08:00:41 +00:00
} ,
{
"refsource" : "CONFIRM" ,
"name" : "https://security.netapp.com/advisory/ntap-20230609-0009/" ,
"url" : "https://security.netapp.com/advisory/ntap-20230609-0009/"
2023-07-24 19:00:34 +00:00
} ,
{
"refsource" : "CONFIRM" ,
"name" : "https://support.apple.com/kb/HT213843" ,
"url" : "https://support.apple.com/kb/HT213843"
} ,
{
"refsource" : "CONFIRM" ,
"name" : "https://support.apple.com/kb/HT213844" ,
"url" : "https://support.apple.com/kb/HT213844"
} ,
{
"refsource" : "CONFIRM" ,
"name" : "https://support.apple.com/kb/HT213845" ,
"url" : "https://support.apple.com/kb/HT213845"
2023-07-25 16:00:35 +00:00
} ,
{
"refsource" : "FULLDISC" ,
"name" : "20230725 APPLE-SA-2023-07-24-6 macOS Big Sur 11.7.9" ,
"url" : "http://seclists.org/fulldisclosure/2023/Jul/52"
} ,
{
"refsource" : "FULLDISC" ,
"name" : "20230725 APPLE-SA-2023-07-24-5 macOS Monterey 12.6.8" ,
"url" : "http://seclists.org/fulldisclosure/2023/Jul/48"
} ,
{
"refsource" : "FULLDISC" ,
"name" : "20230725 APPLE-SA-2023-07-24-4 macOS Ventura 13.5" ,
"url" : "http://seclists.org/fulldisclosure/2023/Jul/47"
2023-10-11 11:00:37 +00:00
} ,
{
"refsource" : "GENTOO" ,
"name" : "GLSA-202310-12" ,
"url" : "https://security.gentoo.org/glsa/202310-12"
2023-05-26 21:00:38 +00:00
}
]
2023-03-14 02:00:34 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2023-05-26 21:00:38 +00:00
"value" : "A denial of service vulnerability exists in curl <v8.1.0 in the way libcurl provides several different backends for resolving host names, selected at build time. If it is built to use the synchronous resolver, it allows name resolves to time-out slow operations using `alarm()` and `siglongjmp()`. When doing this, libcurl used a global buffer that was not mutex protected and a multi-threaded application might therefore crash or otherwise misbehave."
2023-03-14 02:00:34 +00:00
}
]
}
}