Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-23916
HistoryFeb 23, 2023 - 8:15 p.m.

CVE-2023-23916

2023-02-2320:15:13
Debian Security Bug Tracker
security-tracker.debian.org
24

0.001 Low

EPSS

Percentile

43.6%

An allocation of resources without limits or throttling vulnerability exists in curl <v7.88.0 based on the โ€œchainedโ€ HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable โ€œlinksโ€ in this โ€œdecompression chainโ€ wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a โ€œmalloc bombโ€, making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.