CVE-2023-28319

A use after free vulnerability exists in curl <v8.1.0 in the way libcurl offers a feature to verify an SSH server's public key using a SHA 256 hash. When this check fails, libcurl would free the memory for the fingerprint before it returns an error message containing the (now freed) hash. This flaw risks inserting sensitive heap-based data into the error message that might be shown to users or otherwise get leaked and revealed.
References
Link Resource
http://seclists.org/fulldisclosure/2023/Jul/47 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jul/48 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jul/52 Mailing List Third Party Advisory
https://hackerone.com/reports/1913733 Exploit Patch Third Party Advisory
https://security.gentoo.org/glsa/202310-12 Third Party Advisory
https://security.netapp.com/advisory/ntap-20230609-0009/ Third Party Advisory
https://support.apple.com/kb/HT213843 Third Party Advisory
https://support.apple.com/kb/HT213844 Third Party Advisory
https://support.apple.com/kb/HT213845 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_antivirus_connector:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*

History

02 Aug 2023, 16:47

Type Values Removed Values Added
References (CONFIRM) https://support.apple.com/kb/HT213844 - (CONFIRM) https://support.apple.com/kb/HT213844 - Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/48 - (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/48 - Mailing List
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/47 - (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/47 - Mailing List
References (CONFIRM) https://security.netapp.com/advisory/ntap-20230609-0009/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20230609-0009/ - Third Party Advisory
References (CONFIRM) https://support.apple.com/kb/HT213843 - (CONFIRM) https://support.apple.com/kb/HT213843 - Third Party Advisory
References (CONFIRM) https://support.apple.com/kb/HT213845 - (CONFIRM) https://support.apple.com/kb/HT213845 - Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/52 - (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/52 - Mailing List
CPE cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_antivirus_connector:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*

25 Jul 2023, 16:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/47 -
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/52 -
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/48 -

24 Jul 2023, 19:15

Type Values Removed Values Added
References
  • (CONFIRM) https://support.apple.com/kb/HT213844 -
  • (CONFIRM) https://support.apple.com/kb/HT213843 -
  • (CONFIRM) https://support.apple.com/kb/HT213845 -

09 Jun 2023, 08:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20230609-0009/ -

02 Jun 2023, 18:19

Type Values Removed Values Added
CPE cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
CWE CWE-416
References (MISC) https://hackerone.com/reports/1913733 - (MISC) https://hackerone.com/reports/1913733 - Exploit, Patch, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

26 May 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-26 21:15

Updated : 2024-02-04 23:37


NVD link : CVE-2023-28319

Mitre link : CVE-2023-28319

CVE.ORG link : CVE-2023-28319


JSON object : View

Products Affected

netapp

  • h700s_firmware
  • h700s
  • ontap_antivirus_connector
  • h410s_firmware
  • h300s
  • h500s
  • clustered_data_ontap
  • h410s
  • h500s_firmware
  • h300s_firmware

haxx

  • curl

apple

  • macos
CWE
CWE-416

Use After Free