CVE-2023-28319

A use after free vulnerability exists in curl <v8.1.0 in the way libcurl offers a feature to verify an SSH server's public key using a SHA 256 hash. When this check fails, libcurl would free the memory for the fingerprint before it returns an error message containing the (now freed) hash. This flaw risks inserting sensitive heap-based data into the error message that might be shown to users or otherwise get leaked and revealed.
References
Link Resource
http://seclists.org/fulldisclosure/2023/Jul/47 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jul/48 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jul/52 Mailing List Third Party Advisory
https://hackerone.com/reports/1913733 Exploit Patch Third Party Advisory
https://security.gentoo.org/glsa/202310-12 Third Party Advisory
https://security.netapp.com/advisory/ntap-20230609-0009/ Third Party Advisory
https://support.apple.com/kb/HT213843 Third Party Advisory
https://support.apple.com/kb/HT213844 Third Party Advisory
https://support.apple.com/kb/HT213845 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_antivirus_connector:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*

History

20 Oct 2023, 18:42

Type Values Removed Values Added
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/52 - Mailing List (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/52 - Mailing List, Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/48 - Mailing List (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/48 - Mailing List, Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/47 - Mailing List (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/47 - Mailing List, Third Party Advisory
References (GENTOO) https://security.gentoo.org/glsa/202310-12 - (GENTOO) https://security.gentoo.org/glsa/202310-12 - Third Party Advisory

11 Oct 2023, 11:15

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202310-12 -

02 Aug 2023, 16:47

Type Values Removed Values Added
CPE cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_antivirus_connector:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
First Time Netapp h300s Firmware
Apple
Netapp
Netapp h700s
Netapp h410s Firmware
Netapp ontap Antivirus Connector
Netapp clustered Data Ontap
Netapp h300s
Netapp h500s
Netapp h700s Firmware
Netapp h410s
Netapp h500s Firmware
Apple macos
References (CONFIRM) https://security.netapp.com/advisory/ntap-20230609-0009/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20230609-0009/ - Third Party Advisory
References (CONFIRM) https://support.apple.com/kb/HT213845 - (CONFIRM) https://support.apple.com/kb/HT213845 - Third Party Advisory
References (CONFIRM) https://support.apple.com/kb/HT213843 - (CONFIRM) https://support.apple.com/kb/HT213843 - Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/48 - (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/48 - Mailing List
References (CONFIRM) https://support.apple.com/kb/HT213844 - (CONFIRM) https://support.apple.com/kb/HT213844 - Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/52 - (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/52 - Mailing List
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/47 - (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/47 - Mailing List

25 Jul 2023, 16:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/52 -
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/47 -
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/48 -

24 Jul 2023, 19:15

Type Values Removed Values Added
References
  • (CONFIRM) https://support.apple.com/kb/HT213844 -
  • (CONFIRM) https://support.apple.com/kb/HT213845 -
  • (CONFIRM) https://support.apple.com/kb/HT213843 -

09 Jun 2023, 08:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20230609-0009/ -

02 Jun 2023, 18:19

Type Values Removed Values Added
CPE cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Haxx curl
Haxx
References (MISC) https://hackerone.com/reports/1913733 - (MISC) https://hackerone.com/reports/1913733 - Exploit, Patch, Third Party Advisory

26 May 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-26 21:15

Updated : 2024-02-28 20:13


NVD link : CVE-2023-28319

Mitre link : CVE-2023-28319

CVE.ORG link : CVE-2023-28319


JSON object : View

Products Affected

haxx

  • curl

netapp

  • ontap_antivirus_connector
  • h500s_firmware
  • h700s
  • h300s_firmware
  • h410s
  • h700s_firmware
  • h500s
  • h300s
  • h410s_firmware
  • clustered_data_ontap

apple

  • macos
CWE
CWE-416

Use After Free