7.5

CVE-2023-38039

Exploit

When curl retrieves an HTTP response, it stores the incoming headers so that
they can be accessed later via the libcurl headers API.

However, curl did not have a limit in how many or how large headers it would
accept in a response, allowing a malicious server to stream an endless series
of headers and eventually cause curl to run out of heap memory.

Data is provided by the National Vulnerability Database (NVD)
HaxxCurl Version >= 7.84.0 < 8.3.0
FedoraprojectFedora Version37
FedoraprojectFedora Version38
FedoraprojectFedora Version39
MicrosoftWindows 10 1809 Version < 10.0.17763.5122
MicrosoftWindows 10 21h2 Version < 10.0.19044.3693
MicrosoftWindows 10 22h2 Version < 10.0.19045.3693
MicrosoftWindows 11 21h2 Version < 10.0.22000.2600
MicrosoftWindows 11 22h2 Version < 10.0.22621.2715
MicrosoftWindows 11 23h2 Version < 10.0.22631.2715
MicrosoftWindows Server 2019 Version < 10.0.17763.5122
MicrosoftWindows Server 2022 Version < 10.0.20348.2113
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 14.47% 0.942
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-770 Allocation of Resources Without Limits or Throttling

The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.