curl can be told to parse a `.netrc` file for credentials. If that file endsin a line with 4095 consecutive non-white space letters and no newline, curlwould first read past the end of the stack-based buffer, and if the readworks, write a zero byte beyond its boundary.This will in most cases cause a segfault or similar, but circumstances might also cause different outcomes.If a malicious user can provide a custom netrc file to an application or otherwise affect its contents, this flaw could be used as denial-of-service.
The product reads data past the end, or before the beginning, of the intended buffer.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://hackerone.com/reports/1721098 | exploit third party advisory patch |
https://security.gentoo.org/glsa/202212-01 | third party advisory vendor advisory |
https://security.netapp.com/advisory/ntap-20230110-0006/ | third party advisory |
https://support.apple.com/kb/HT213604 | third party advisory |
https://support.apple.com/kb/HT213605 | third party advisory |
http://seclists.org/fulldisclosure/2023/Jan/20 | third party advisory mailing list |
http://seclists.org/fulldisclosure/2023/Jan/19 | third party advisory mailing list |