When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.
Weaknesses in this category identify some of the underlying problems that commonly allow attackers to manipulate the business logic of an application. Errors in business logic can be devastating to an entire application. They can be difficult to find automatically, since they typically involve legitimate use of the application's functionality. However, many business logic errors can exhibit patterns that are similar to well-understood implementation and design weaknesses.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://hackerone.com/reports/1590071 | third party advisory exploit |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/ | mailing list third party advisory vendor advisory |
https://www.debian.org/security/2022/dsa-5197 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html | third party advisory mailing list |
https://security.netapp.com/advisory/ntap-20220915-0003/ | third party advisory |
https://support.apple.com/kb/HT213488 | third party advisory |
http://seclists.org/fulldisclosure/2022/Oct/41 | third party advisory mailing list |
http://seclists.org/fulldisclosure/2022/Oct/28 | third party advisory mailing list |
https://security.gentoo.org/glsa/202212-01 | third party advisory vendor advisory |