First published: Wed Sep 13 2023(Updated: )
Accessibility. A privacy issue was addressed with improved private data redaction for log entries.
Credit: CVE-2023-38545 CVE-2023-38039 CVE-2023-38546 support@hackerone.com CVE-2023-42915 Noah Roskin-Frazee Pr Ivan Fratric Google Project Zero Trend Micro Zero Day InitiativeMichael DePlante @izobashi Trend Micro Zero Day InitiativeMickey Jin @patch1t an anonymous researcher Marc Newlin SkySafeKoh M. Nakagawa @tsunek0h Yann GASCUEL Alter SolutionsAnthony Cruz Tyrant Corp @App Wojciech Regula SecuRingZhenjiang Zhao Pangu TeamQianxin Junsung Lee Meysam Firouzi @R00tkitSMM Pan ZhenPeng @Peterpan0927 STAR Labs SG PteEloi Benoist-Vanderbeken @elvanderb SynacktivCVE-2023-42893 CVE-2023-3618 CVE-2020-19185 CVE-2020-19186 CVE-2020-19187 CVE-2020-19188 CVE-2020-19189 CVE-2020-19190 Ron Masas BreakPointCsaba Fitzl @theevilbit OffSecCsaba Fitzl @theevilbit Offensive SecurityArsenii Kostromin (0x3c3e) Mattie Behrens Joshua Jewett @JoshJewett33 Zhongquan Li @Guluisacat Zhongquan Li @Guluisacat Dawn Security Lab of JingDongCVE-2023-5344 Pwn2car Zoom Offensive Security Team Nan Wang @eternalsakura13 360 Vulnerability Research Instituterushikesh nandedkar SungKwon Lee (Demon.Team) Kirin @Pwnrin Don Clarke
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 11 | =21H2 | |
Microsoft Windows 11 | =22H2 | |
Microsoft Windows 11 | =21H2 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows 11 | =23H2 | |
Microsoft Windows 11 | =22H2 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows 11 | =23H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows 11 | =22H2 | |
Microsoft Windows 11 | =21H2 | |
Microsoft Windows 11 | =22H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 11 | =21H2 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 11 | =23H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows 11 | =23H2 | |
redhat/libcurl | <8.3.0 | 8.3.0 |
Apple macOS Monterey | <12.7.3 | 12.7.3 |
ubuntu/curl | <7.88.1-8ubuntu2.2 | 7.88.1-8ubuntu2.2 |
ubuntu/curl | <8.2.1-1ubuntu3 | 8.2.1-1ubuntu3 |
ubuntu/curl | <8.2.1-1ubuntu3 | 8.2.1-1ubuntu3 |
debian/curl | 7.64.0-4+deb10u2 7.64.0-4+deb10u9 7.74.0-1.3+deb11u11 7.88.1-10+deb12u5 8.7.1-5 | |
Apple macOS | <14.2 | 14.2 |
Apple macOS | <13.6.4 | 13.6.4 |
Microsoft CBL-Mariner | ||
Microsoft CBL-Mariner | ||
Apple iOS, iPadOS, and watchOS | <16.7.5 | 16.7.5 |
Apple iOS, iPadOS, and watchOS | <16.7.5 | 16.7.5 |
Curl | >=7.84.0<8.3.0 | |
Fedora | =37 | |
Fedora | =38 | |
Fedora | =39 | |
Microsoft Windows 10 1809 | <10.0.17763.5122 | |
Microsoft Windows 10 21h2 | <10.0.19044.3693 | |
Microsoft Windows 10 22h2 | <10.0.19045.3693 | |
Microsoft Windows 11 21h2 | <10.0.22000.2600 | |
Microsoft Windows 11 22h2 | <10.0.22621.2715 | |
Microsoft Windows 11 23h2 | <10.0.22631.2715 | |
Microsoft Windows Server 2019 | <10.0.17763.5122 | |
Microsoft Windows Server 2022 | <10.0.20348.2113 | |
IBM QRadar WinCollect | <=10.0-10.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-38039 is a vulnerability in the curl library where HTTP headers can consume all memory.
CVE-2023-38039 affects curl by allowing a malicious server to send an endless series of headers, consuming all available memory.
CVE-2023-38039 has a severity rating of high (7.5).
To fix CVE-2023-38039 on Ubuntu, update the 'curl' package to version 7.88.1-8ubuntu2.2 or later.
To fix CVE-2023-38039 on Debian, update the 'curl' package to version 7.88.1-10 or later.