A quick overview of the recently discovered vulnerability. Learn how you can practice exploiting (and defending against) the local privilege escalation attack on the HTB platform!
Summary
curl version 8.4.0 has been released. According to the developers of curl, this version mitigates a vulnerability that has been present in curl for over 10 years and has not, to this point, been exploited. This vulnerability has been disclosed as a SOCKS5 heap buffer overflow and is currently rated HIGH.
Threat Type
Vulnerability
Overview
The developers of curl have released version 8.4.0 of the software. This update was designed to mitigate at least two previously undisclosed vulnerabilities, one o
On October 11th, 2023, a heap-based buffer overflow in curl was disclosed under the identifier CVE-2023-38545. The vulnerability affects libcurl 7.69.0 to and including 8.3.0. Vulnerable versions of libcurl may be embedded in existing applications. However, to reach the vulnerable code path, the application must be configured to utilize one of the SOCKS5 proxy modes and attempt to resolve a hostname with extraneous length.