{"id":"CURL-CVE-2023-38545","summary":"SOCKS5 heap buffer overflow","details":"This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the hostname to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that hostname can be is 255 bytes.\n\nIf the hostname is detected to be longer than 255 bytes, curl switches to\nlocal name resolving and instead passes on the resolved address only to the\nproxy. Due to a bug, the local variable that means \"let the host resolve the\nname\" could get the wrong value during a slow SOCKS5 handshake, and contrary\nto the intention, copy the too long hostname to the target buffer instead of\ncopying just the resolved address there.","aliases":["CVE-2023-38545"],"modified":"2024-09-11T06:12:27.611580Z","published":"2023-10-11T08:00:00Z","database_specific":{"issue":"https://hackerone.com/reports/2187833","www":"https://curl.se/docs/CVE-2023-38545.html","package":"curl","severity":"High","affects":"both","CWE":{"desc":"Heap-based Buffer Overflow","id":"CWE-122"},"URL":"https://curl.se/docs/CVE-2023-38545.json","award":{"currency":"USD","amount":"4660"},"last_affected":"8.3.0"},"affected":[{"ranges":[{"type":"SEMVER","events":[{"introduced":"7.69.0"},{"fixed":"8.4.0"}]},{"type":"GIT","repo":"https://github.com/curl/curl.git","events":[{"introduced":"4a4b63daaa01ef59b131d91e8e6e6dfe275c0f08"},{"fixed":"fb4415d8aee6c1045be932a34fe6107c2f5ed147"}]}],"versions":["8.3.0","8.2.1","8.2.0","8.1.2","8.1.1","8.1.0","8.0.1","8.0.0","7.88.1","7.88.0","7.87.0","7.86.0","7.85.0","7.84.0","7.83.1","7.83.0","7.82.0","7.81.0","7.80.0","7.79.1","7.79.0","7.78.0","7.77.0","7.76.1","7.76.0","7.75.0","7.74.0","7.73.0","7.72.0","7.71.1","7.71.0","7.70.0","7.69.1","7.69.0"],"database_specific":{"vanir_signatures":[{"deprecated":false,"source":"https://github.com/curl/curl.git/commit/fb4415d8aee6c1045be932a34fe6107c2f5ed147","signature_version":"v1","digest":{"line_hashes":["312460549901445267928349847414673385881","275074174645245181067402918537199669107","36586585150953595056584450650776892379","77800659807126581022969160177335782670","168633480660475384767702009198695086351","150744559009019551521796744958006889501","118894448670136795621524001460295023103","235411617067617686159474416391384910533","255141486514962514100899321603004904968","144159262164073881772169588272567821106"],"threshold":0.9},"signature_type":"Line","id":"CURL-CVE-2023-38545-ba35533b","target":{"file":"lib/socks.c"}},{"deprecated":false,"source":"https://github.com/curl/curl.git/commit/fb4415d8aee6c1045be932a34fe6107c2f5ed147","signature_version":"v1","digest":{"length":10901,"function_hash":"78686540855549523366077688098291190878"},"signature_type":"Function","id":"CURL-CVE-2023-38545-da844016","target":{"file":"lib/socks.c","function":"do_SOCKS5"}}],"source":"https://curl.se/docs/CURL-CVE-2023-38545.json"}}],"schema_version":"1.7.3","credits":[{"name":"Jay Satiro","type":"FINDER"},{"name":"Jay Satiro","type":"REMEDIATION_DEVELOPER"}]}