First published: Tue Jan 30 2024(Updated: )
cURL libcurl is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the tool_cb_wrt component. By sending a specially crafted request, a remote attacker could overflow a buffer and execute arbitrary code or cause a denial of service condition on the system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
curl | =8.4.0 | |
curl | =8.5.0 | |
Curl Tiny Curl | =8.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52071 is classified as a critical vulnerability due to its potential to execute arbitrary code and cause denial of service.
To fix CVE-2023-52071, upgrade to cURL version 8.4.1 or later, or version 8.5.1 or later.
CVE-2023-52071 affects cURL versions 8.4.0 and 8.5.0, as well as Tiny Curl version 8.4.0.
CVE-2023-52071 is a stack-based buffer overflow vulnerability caused by improper bounds checking.
Yes, CVE-2023-52071 can be exploited remotely by sending a specially crafted request to the affected cURL versions.