Haxx

Libcurl

61 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.42%
  • Published 05.02.2025 10:15:22
  • Last modified 27.06.2025 19:24:08

When libcurl is asked to perform automatic gzip decompression of content-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option, **using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would make libcurl perform a buffer ov...

  • EPSS 0.08%
  • Published 19.08.2024 17:15:07
  • Last modified 14.03.2025 16:15:31

The libcurl CURLOPT_SSL_VERIFYPEER option was disabled on a subset of requests made by Nest production devices which enabled a potential man-in-the-middle attack on requests to Google cloud services by any host the traffic was routed through.

Exploit
  • EPSS 7.1%
  • Published 31.07.2024 08:15:02
  • Last modified 21.11.2024 09:51:10

libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect field, the parser might end up using -1 for the length of the *time fraction*, leading to a `strlen()` ge...

Exploit
  • EPSS 0.73%
  • Published 24.07.2024 08:15:03
  • Last modified 21.11.2024 09:50:26

libcurl's URL API function [curl_url_get()](https://curl.se/libcurl/c/curl_url_get.html) offers punycode conversions, to and from IDN. Asking to convert a name that is exactly 256 bytes, libcurl ends up reading outside of a stack based buffer when bu...

Exploit
  • EPSS 1.28%
  • Published 24.07.2024 08:15:03
  • Last modified 29.11.2024 12:15:08

libcurl's ASN1 parser has this utf8asn1str() function used for parsing an ASN.1 UTF-8 string. Itcan detect an invalid field and return error. Unfortunately, when doing so it also invokes `free()` on a 4 byte localstack buffer. Most modern malloc imp...

  • EPSS 0.21%
  • Published 18.10.2023 04:15:11
  • Last modified 13.02.2025 17:16:48

This flaw allows an attacker to insert cookies at will into a running program using libcurl, if the specific series of conditions are met. libcurl performs transfers. In its API, an application creates "easy handles" that are the individual handles ...

  • EPSS 22.22%
  • Published 18.10.2023 04:15:11
  • Last modified 13.02.2025 17:16:47

This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. When curl is asked to pass along the host name to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length th...

Exploit
  • EPSS 0.01%
  • Published 30.03.2023 20:15:07
  • Last modified 09.06.2025 15:15:29

An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previous...

Exploit
  • EPSS 0.11%
  • Published 30.03.2023 20:15:07
  • Last modified 21.11.2024 07:53:07

A double free vulnerability exists in libcurl <8.0.0 when sharing HSTS data between separate "handles". This sharing was introduced without considerations for do this sharing across separate threads but there was no indication of this fact in the doc...

Exploit
  • EPSS 0.01%
  • Published 30.03.2023 20:15:07
  • Last modified 14.02.2025 16:15:33

An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION opt...