CVE-2023-38545 (CNNVD-202310-917)

HIGH
中文标题:
curl 缓冲区错误漏洞
英文标题:
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. When curl is asked...
CVSS分数: 8.8
发布时间: 2023-10-18 03:52:00
漏洞类型: 缓冲区错误
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

curl是一款用于从服务器传输数据或向服务器传输数据的工具。 curl 7.69.0至8.3.0版本存在安全漏洞,该漏洞源于SOCKS5存在堆栈溢出漏洞。

英文描述:

This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. When curl is asked to pass along the host name to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that host name can be is 255 bytes. If the host name is detected to be longer, curl switches to local name resolving and instead passes on the resolved address only. Due to this bug, the local variable that means "let the host resolve the name" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long host name to the target buffer instead of copying just the resolved address there. The target buffer being a heap based buffer, and the host name coming from the URL that curl has been told to operate with.

CWE类型:
CWE-787
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
curl curl - < 8.4.0 - cpe:2.3:a:curl:curl:*:*:*:*:*:*:*:*
haxx libcurl * - - cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
fedoraproject fedora 37 - - cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
netapp active_iq_unified_manager - - - cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
netapp oncommand_insight - - - cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
netapp oncommand_workflow_automation - - - cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
microsoft windows_10_1809 * - - cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*
microsoft windows_10_21h2 * - - cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*
microsoft windows_10_22h2 * - - cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*
microsoft windows_11_21h2 * - - cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*
microsoft windows_11_22h2 * - - cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*
microsoft windows_11_23h2 * - - cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*
microsoft windows_server_2019 * - - cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
microsoft windows_server_2022 * - - cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
134c704f-9b21-4f2e-91b3-4a467353bcc0 OTHER
nvd.nist.gov
访问
134c704f-9b21-4f2e-91b3-4a467353bcc0 OTHER
nvd.nist.gov
访问
134c704f-9b21-4f2e-91b3-4a467353bcc0 OTHER
nvd.nist.gov
访问
CVSS评分详情
3.1 (adp)
HIGH
8.8
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2023-10-18 03:52:00
修改时间:
2025-08-27 20:32:53
创建时间:
2025-11-11 15:38:29
更新时间:
2025-11-11 15:58:17
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2023-38545 2025-11-11 15:22:02 2025-11-11 07:38:29
NVD nvd_CVE-2023-38545 2025-11-11 14:59:11 2025-11-11 07:46:35
CNNVD cnnvd_CNNVD-202310-917 2025-11-11 15:11:19 2025-11-11 07:58:17
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:58:17
vulnerability_type: 未提取 → 缓冲区错误; cnnvd_id: 未提取 → CNNVD-202310-917; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 缓冲区错误
  • cnnvd_id: 未提取 -> CNNVD-202310-917
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:46:35
affected_products_count: 1 → 14; references_count: 13 → 16; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 1 -> 14
  • references_count: 13 -> 16
  • data_sources: ['cve'] -> ['cve', 'nvd']