First published: Tue Mar 21 2023(Updated: )
A use after free vulnerability exists in curl <7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 F5OS | =1.7.0>=1.5.0<=1.5.2=1.4.0>=1.3.0<=1.3.2 | |
F5 F5OS | >=1.6.0<=1.6.2>=1.5.0<=1.5.1>=1.3.0<=1.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000133092 is classified as critical due to its potential for remote code execution.
To fix F5-K000133092, upgrade curl to version 7.87.0 or later in affected products.
Affected versions include F5OS-A versions 1.4.0 to 1.7.0 and F5OS-C versions 1.3.0 to 1.6.2.
F5-K000133092 could result in remote code execution if exploited, allowing attackers to take control of affected systems.
Yes, F5-K000133092 is specifically related to issues when tunneling protocols like SMB and TELNET through an HTTP proxy.