curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.
References
| Link | Resource |
|---|---|
| https://hackerone.com/reports/1570651 | Exploit Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/ |
Configurations
Information
Published : 2022-07-07 13:15
Updated : 2022-07-15 03:15
NVD link : CVE-2022-32206
Mitre link : CVE-2022-32206
JSON object : View
Products Affected
haxx
- curl
CWE
CWE-770
Allocation of Resources Without Limits or Throttling
