CVE-2023-38545 - Heap Buffer Overflow
Severity: Low2023-12-22
Abstract
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake.
When curl is asked to pass along the host name to the SOCKS5 proxy to allow that to resolve
the address instead of it getting done by curl itself, the maximum length that host name can
be is 255 bytes.
If the host name is detected to be longer, curl switches to local
name resolving and instead passes on the resolved address only. Due to this bug, the local
variable that means "let the host resolve the name" could get the wrong value during a slow
SOCKS5 handshake, and contrary to the intention, copy the too long host name to the target
buffer instead of copying just the resolved address there.
The target buffer being a
heap based buffer, and the host name coming from the URL that curl has been told to operate
with.
The Oxygen products incorporate curl, libcurl4 as a third-party libraries. This advisory was opened to address the potential impact of this third-party libraries vulnerability.
Affected Products/Versions
Product | Severity | Fixed Release Availability |
Oxygen Feedback v3.0.3 and older | Low | N/A |
Detail
CVE-2023-38545
Severity: Critical
CVSS Score: 9.8
The curl, libcurl4 third-party libraries used by Oxygen XML products are an affected version mentioned in CVE-2023-38545 vulnerability description. However, Oxygen XML Feedback is a Java based application. For that reason we rated this vulnerability as low.