First published: Wed Jul 31 2024(Updated: )
cURL libcurl could allow a local attacker to obtain sensitive information, caused by an out-of-bounds read flaw in the the GTime2str() function. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain sensitive information or cause the application to crash.
Credit: 2499f714-1537-4658-8207-48ae4bb9eae9 2499f714-1537-4658-8207-48ae4bb9eae9
Affected Software | Affected Version | How to fix |
---|---|---|
debian/curl | <=7.88.1-10+deb12u5 | 7.74.0-1.3+deb11u13 7.74.0-1.3+deb11u14 7.88.1-10+deb12u8 8.11.0-1 |
IBM Cognos Dashboards | <=5.0.0 | |
IBM Cognos Dashboards | <=4.8.0 | |
libcurl | >=7.32.0<8.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7264 is considered a moderate severity vulnerability due to its potential to leak sensitive information.
To fix CVE-2024-7264, update to the latest versions of affected software such as curl 7.74.0-1.3+deb11u14 or later.
CVE-2024-7264 affects curl versions up to 7.88.1-10+deb12u5, as well as IBM Cognos Dashboards on Cloud Pak for Data versions up to 5.0.0.
An attacker can exploit CVE-2024-7264 by sending a specially crafted request that leads to an out-of-bounds read, potentially disclosing sensitive information.
Users of curl and IBM Cognos Dashboards on Cloud Pak for Data who have not updated to the patched versions are vulnerable to CVE-2024-7264.