CVE-2023-28320

A denial of service vulnerability exists in curl <v8.1.0 in the way libcurl provides several different backends for resolving host names, selected at build time. If it is built to use the synchronous resolver, it allows name resolves to time-out slow operations using `alarm()` and `siglongjmp()`. When doing this, libcurl used a global buffer that was not mutex protected and a multi-threaded application might therefore crash or otherwise misbehave.
References
Link Resource
http://seclists.org/fulldisclosure/2023/Jul/47 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jul/48 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jul/52 Mailing List Third Party Advisory
https://hackerone.com/reports/1929597 Exploit Patch Third Party Advisory
https://security.gentoo.org/glsa/202310-12 Third Party Advisory
https://security.netapp.com/advisory/ntap-20230609-0009/ Third Party Advisory
https://support.apple.com/kb/HT213843 Third Party Advisory
https://support.apple.com/kb/HT213844 Third Party Advisory
https://support.apple.com/kb/HT213845 Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jul/47 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jul/48 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jul/52 Mailing List Third Party Advisory
https://hackerone.com/reports/1929597 Exploit Patch Third Party Advisory
https://security.gentoo.org/glsa/202310-12 Third Party Advisory
https://security.netapp.com/advisory/ntap-20230609-0009/ Third Party Advisory
https://support.apple.com/kb/HT213843 Third Party Advisory
https://support.apple.com/kb/HT213844 Third Party Advisory
https://support.apple.com/kb/HT213845 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_antivirus_connector:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:54

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2023/Jul/47 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2023/Jul/47 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2023/Jul/48 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2023/Jul/48 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2023/Jul/52 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2023/Jul/52 - Mailing List, Third Party Advisory
References () https://hackerone.com/reports/1929597 - Exploit, Patch, Third Party Advisory () https://hackerone.com/reports/1929597 - Exploit, Patch, Third Party Advisory
References () https://security.gentoo.org/glsa/202310-12 - Third Party Advisory () https://security.gentoo.org/glsa/202310-12 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20230609-0009/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20230609-0009/ - Third Party Advisory
References () https://support.apple.com/kb/HT213843 - Third Party Advisory () https://support.apple.com/kb/HT213843 - Third Party Advisory
References () https://support.apple.com/kb/HT213844 - Third Party Advisory () https://support.apple.com/kb/HT213844 - Third Party Advisory
References () https://support.apple.com/kb/HT213845 - Third Party Advisory () https://support.apple.com/kb/HT213845 - Third Party Advisory

20 Oct 2023, 18:42

Type Values Removed Values Added
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/52 - Mailing List (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/52 - Mailing List, Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/48 - Mailing List (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/48 - Mailing List, Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/47 - Mailing List (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/47 - Mailing List, Third Party Advisory
References (GENTOO) https://security.gentoo.org/glsa/202310-12 - (GENTOO) https://security.gentoo.org/glsa/202310-12 - Third Party Advisory

11 Oct 2023, 11:15

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202310-12 -

02 Aug 2023, 16:46

Type Values Removed Values Added
First Time Netapp h300s Firmware
Apple
Netapp
Netapp h700s
Netapp h410s Firmware
Netapp ontap Antivirus Connector
Netapp clustered Data Ontap
Netapp h300s
Netapp h500s
Netapp h700s Firmware
Netapp h410s
Netapp h500s Firmware
Apple macos
References (CONFIRM) https://security.netapp.com/advisory/ntap-20230609-0009/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20230609-0009/ - Third Party Advisory
References (CONFIRM) https://support.apple.com/kb/HT213845 - (CONFIRM) https://support.apple.com/kb/HT213845 - Third Party Advisory
References (CONFIRM) https://support.apple.com/kb/HT213843 - (CONFIRM) https://support.apple.com/kb/HT213843 - Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/48 - (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/48 - Mailing List
References (CONFIRM) https://support.apple.com/kb/HT213844 - (CONFIRM) https://support.apple.com/kb/HT213844 - Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/52 - (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/52 - Mailing List
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/47 - (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/47 - Mailing List
CPE cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_antivirus_connector:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

25 Jul 2023, 16:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/52 -
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/47 -
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/48 -

24 Jul 2023, 19:15

Type Values Removed Values Added
References
  • (CONFIRM) https://support.apple.com/kb/HT213844 -
  • (CONFIRM) https://support.apple.com/kb/HT213845 -
  • (CONFIRM) https://support.apple.com/kb/HT213843 -

09 Jun 2023, 08:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20230609-0009/ -

02 Jun 2023, 18:21

Type Values Removed Values Added
CWE CWE-362
CWE-400
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9
References (MISC) https://hackerone.com/reports/1929597 - (MISC) https://hackerone.com/reports/1929597 - Exploit, Patch, Third Party Advisory
First Time Haxx curl
Haxx
CPE cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

26 May 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-26 21:15

Updated : 2024-11-21 07:54


NVD link : CVE-2023-28320

Mitre link : CVE-2023-28320

CVE.ORG link : CVE-2023-28320


JSON object : View

Products Affected

netapp

  • h700s
  • h300s
  • h300s_firmware
  • ontap_antivirus_connector
  • h410s_firmware
  • h500s
  • clustered_data_ontap
  • h700s_firmware
  • h410s
  • h500s_firmware

apple

  • macos

haxx

  • curl
CWE
CWE-400

Uncontrolled Resource Consumption

CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')