6.5
CVE-2022-32206
- EPSS 2.57%
- Published 07.07.2022 13:15:08
- Last modified 05.05.2025 17:18:13
- Source support@hackerone.com
- Teams watchlist Login
- Open Login
curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.
Data is provided by the National Vulnerability Database (NVD)
Fedoraproject ≫ Fedora Version35
Debian ≫ Debian Linux Version10.0
Debian ≫ Debian Linux Version11.0
Netapp ≫ Clustered Data Ontap Version-
Netapp ≫ Element Software Version-
Netapp ≫ Hci Management Node Version-
Netapp ≫ Bootstrap Os Version-
Netapp ≫ H300s Firmware Version-
Netapp ≫ H500s Firmware Version-
Netapp ≫ H700s Firmware Version-
Netapp ≫ H410s Firmware Version-
Siemens ≫ Scalance Sc622-2c Firmware Version < 3.0
Siemens ≫ Scalance Sc626-2c Firmware Version < 3.0
Siemens ≫ Scalance Sc632-2c Firmware Version < 3.0
Siemens ≫ Scalance Sc636-2c Firmware Version < 3.0
Siemens ≫ Scalance Sc642-2c Firmware Version < 3.0
Siemens ≫ Scalance Sc646-2c Firmware Version < 3.0
Splunk ≫ Universal Forwarder Version >= 8.2.0 < 8.2.12
Splunk ≫ Universal Forwarder Version >= 9.0.0 < 9.0.6
Splunk ≫ Universal Forwarder Version9.1.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 2.57% | 0.85 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:N/A:P
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
|
CWE-770 Allocation of Resources Without Limits or Throttling
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.