CVE-2023-28319

A use after free vulnerability exists in curl <v8.1.0 in the way libcurl offers a feature to verify an SSH server's public key using a SHA 256 hash. When this check fails, libcurl would free the memory for the fingerprint before it returns an error message containing the (now freed) hash. This flaw risks inserting sensitive heap-based data into the error message that might be shown to users or otherwise get leaked and revealed.
References
Link Resource
http://seclists.org/fulldisclosure/2023/Jul/47 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jul/48 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jul/52 Mailing List Third Party Advisory
https://hackerone.com/reports/1913733 Exploit Patch Third Party Advisory
https://security.gentoo.org/glsa/202310-12 Third Party Advisory
https://security.netapp.com/advisory/ntap-20230609-0009/ Third Party Advisory
https://support.apple.com/kb/HT213843 Third Party Advisory
https://support.apple.com/kb/HT213844 Third Party Advisory
https://support.apple.com/kb/HT213845 Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jul/47 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jul/48 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jul/52 Mailing List Third Party Advisory
https://hackerone.com/reports/1913733 Exploit Patch Third Party Advisory
https://security.gentoo.org/glsa/202310-12 Third Party Advisory
https://security.netapp.com/advisory/ntap-20230609-0009/ Third Party Advisory
https://support.apple.com/kb/HT213843 Third Party Advisory
https://support.apple.com/kb/HT213844 Third Party Advisory
https://support.apple.com/kb/HT213845 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_antivirus_connector:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:54

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2023/Jul/47 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2023/Jul/47 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2023/Jul/48 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2023/Jul/48 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2023/Jul/52 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2023/Jul/52 - Mailing List, Third Party Advisory
References () https://hackerone.com/reports/1913733 - Exploit, Patch, Third Party Advisory () https://hackerone.com/reports/1913733 - Exploit, Patch, Third Party Advisory
References () https://security.gentoo.org/glsa/202310-12 - Third Party Advisory () https://security.gentoo.org/glsa/202310-12 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20230609-0009/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20230609-0009/ - Third Party Advisory
References () https://support.apple.com/kb/HT213843 - Third Party Advisory () https://support.apple.com/kb/HT213843 - Third Party Advisory
References () https://support.apple.com/kb/HT213844 - Third Party Advisory () https://support.apple.com/kb/HT213844 - Third Party Advisory
References () https://support.apple.com/kb/HT213845 - Third Party Advisory () https://support.apple.com/kb/HT213845 - Third Party Advisory

Information

Published : 2023-05-26 21:15

Updated : 2025-01-15 16:15


NVD link : CVE-2023-28319

Mitre link : CVE-2023-28319

CVE.ORG link : CVE-2023-28319


JSON object : View

Products Affected

haxx

  • curl

netapp

  • ontap_antivirus_connector
  • h300s
  • clustered_data_ontap
  • h300s_firmware
  • h410s
  • h410s_firmware
  • h700s
  • h700s_firmware
  • h500s_firmware
  • h500s

apple

  • macos
CWE
CWE-416

Use After Free