First published: Fri Jun 11 2021(Updated: )
A flaw was found in the way curl handled telnet protocol option for sending environment variables, which could lead to sending of uninitialized data from a stack-based buffer to the server. This issue leads to potentially revealing sensitive internal information to the server using a clear-text network protocol.
Credit: Red Hat Product Security support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/curl | <0:7.61.1-22.el8 | 0:7.61.1-22.el8 |
redhat/curl | <7.78.0 | 7.78.0 |
IBM QRadar SIEM | <=7.5.0 GA | |
IBM QRadar SIEM | <=7.4.3 GA - 7.4.3 FP4 | |
IBM QRadar SIEM | <=7.3.3 GA - 7.3.3 FP10 | |
Apple macOS | <11.6 | 11.6 |
macOS Catalina | ||
Curl | >=7.7<7.78.0 | |
Fedora | =33 | |
netapp cloud backup | ||
NetApp Clustered Data ONTAP | ||
netapp hci management node | ||
netapp solidfire | ||
Apple iOS and macOS | =10.15.7 | |
Apple iOS and macOS | =10.15.7-security_update_2021-001 | |
Apple iOS and macOS | =10.15.7-security_update_2021-002 | |
Apple iOS and macOS | =10.15.7-security_update_2021-003 | |
Apple iOS and macOS | =10.15.7-security_update_2021-004 | |
Apple iOS and macOS | =11.0 | |
Apple iOS and macOS | =11.0.1 | |
Apple iOS and macOS | =11.1 | |
Apple iOS and macOS | =11.1.0 | |
Apple iOS and macOS | =11.2 | |
Apple iOS and macOS | =11.2.1 | |
Apple iOS and macOS | =11.3 | |
Apple iOS and macOS | =11.3.1 | |
Apple iOS and macOS | =11.4 | |
Apple iOS and macOS | =11.5 | |
MySQL | >=5.7.0<=5.7.35 | |
MySQL | >=8.0.0<=8.0.26 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.57 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.58 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.59 | |
siemens sinec infrastructure network services | <1.0.1.1 | |
Siemens SINEMA Remote Connect | <3.1 | |
All of | ||
netapp h300s firmware | ||
netapp h300s | ||
All of | ||
NetApp H500S Firmware | ||
netapp h500s | ||
All of | ||
netapp h700s firmware | ||
netapp h700s | ||
All of | ||
netapp h300e firmware | ||
netapp h300e | ||
All of | ||
netapp h500e firmware | ||
netapp h500e | ||
All of | ||
netapp h700e firmware | ||
netapp h700e | ||
All of | ||
netapp h410s firmware | ||
netapp h410s | ||
Splunk Universal Forwarder | >=8.2.0<8.2.12 | |
Splunk Universal Forwarder | >=9.0.0<9.0.6 | |
Splunk Universal Forwarder | =9.1.0 | |
netapp h300s firmware | ||
netapp h300s | ||
NetApp H500S Firmware | ||
netapp h500s | ||
netapp h700s firmware | ||
netapp h700s | ||
netapp h300e firmware | ||
netapp h300e | ||
netapp h500e firmware | ||
netapp h500e | ||
netapp h700e firmware | ||
netapp h700e | ||
netapp h410s firmware | ||
netapp h410s |
This issue can be avoided by not setting any telnet options for the curl command line tool (using the -t / --telnet-option command line option) or the libcurl library (using the CURLOPT_TELNETOPTIONS option) when telnet protocol is not meant to be used. If telnet protocol needs to be used with curl / libcurl, along with the NEW_ENV telnet option, ensure that no environment variable set via the NEW_ENV option has the name or value longer than 127 bytes.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2021-22925.
The severity of CVE-2021-22925 is medium.
The affected software includes macOS Big Sur, Catalina, Red Hat curl, IBM QRadar SIEM.
You can fix CVE-2021-22925 on macOS Big Sur by updating to the latest version 11.6.
You can find more information about CVE-2021-22925 at the following references: [link 1](https://support.apple.com/en-us/HT212804), [link 2](https://support.apple.com/en-us/HT212805), [link 3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1964887).