SB2024072431 - Multiple vulnerabilities in cURL
Published: July 24, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Out-of-bounds read (CVE-ID: CVE-2024-6874)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the curl_url_get() function when parsing IDN URLs. A remote attacker can pass a specially crafted URL to the application, trigger an out-of-bounds read error and read contents of memory on the system.
2) Double free (CVE-ID: CVE-2024-6197)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in ASN1 parser within the utf8asn1str() function. A remote attacker can pass specially crafted TLS certificate to the application, trigger double free error and execute arbitrary code on the target system.
The vulnerable code can only be reached when curl is built to use GnuTLS, wolfSSL, Schannel or Secure Transport.
Remediation
Install update from vendor's website.
References
- https://curl.se/docs/CVE-2024-6874.json
- https://curl.se/docs/CVE-2024-6874.html
- https://hackerone.com/reports/2604391
- http://www.openwall.com/lists/oss-security/2024/07/24/2
- https://curl.se/docs/CVE-2024-6197.json
- https://curl.se/docs/CVE-2024-6197.html
- https://hackerone.com/reports/2559516
- http://www.openwall.com/lists/oss-security/2024/07/24/1