- Description
- libcurl's ASN1 parser has this utf8asn1str() function used for parsing an ASN.1 UTF-8 string. Itcan detect an invalid field and return error. Unfortunately, when doing so it also invokes `free()` on a 4 byte localstack buffer. Most modern malloc implementations detect this error and immediately abort. Some however accept the input pointer and add that memory to its list of available chunks. This leads to the overwriting of nearby stack memory. The content of the overwrite is decided by the `free()` implementation; likely to be memory pointers and a set of flags. The most likely outcome of exploting this flaw is a crash, although it cannot be ruled out that more serious results can be had in special circumstances.
- Source
- 2499f714-1537-4658-8207-48ae4bb9eae9
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
- Hype score
- Not currently trending
CVE-2024-6197: Welches Risiko birgt die neue Curl- und Libcurl-Schwachstelle? https://t.co/QhAPPZIO2c
@it__security
20 Jan 2025
86 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
JFrog #security researchers have found that the high-severity Curl and Libcurl #CVE (CVE-2024-6197), despite its 7.5 #CVSS score, is nearly impossible to exploit. The preconditions for vulnerability are more extensive than initially believed, making real-world exploitation very…
@JFrogSecurity
18 Dec 2024
5 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Latest CVEs from October 2024: Key Points 1. libcurl CVE (CVE-2024-6197): This high-severity flaw in curl involves improper handling of TLS certificates. It can lead to remote code execution by overwriting memory, making it a critical vulnerability for any application using… ht
@BuildaCyberLab
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3D3B1F73-722A-4CD2-B1C4-830050B881D6",
"versionEndExcluding": "8.9.0",
"versionStartIncluding": "8.6.0"
}
],
"operator": "OR"
}
]
}
]