[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Heap-based buffer overflow vulnerability in curl and Oracle Database Server - CVE-2023-38545

ID: oval:org.secpod.oval:def:93707Date: (C)2023-10-11   (M)2024-04-23
Class: VULNERABILITYFamily: unix




A heap-based buffer overflow flaw was found in the SOCKS5 proxy handshake in the Curl package. If Curl is unable to resolve the address itself, it passes the hostname to the SOCKS5 proxy. However, the maximum length of the hostname that can be passed is 255 bytes. If the hostname is longer, then Curl switches to the local name resolving and passes the resolved address only to the proxy. The local variable that instructs Curl to "let the host resolve the name" could obtain the wrong value during a slow SOCKS5 handshake, resulting in the too-long hostname being copied to the target buffer instead of the resolved address, which was not the intended behavior.

Platform:
Oracle Linux 9
Rocky Linux 9
AlmaLinux 9
Linux
Product:
curl
libcurl
Oracle Database Server
Reference:
CVE-2023-38545
CVE    1
CVE-2023-38545

© SecPod Technologies