CVE-2024-7264

libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect field, the parser might end up using -1 for the length of the *time fraction*, leading to a `strlen()` getting performed on a pointer to a heap buffer area that is not (purposely) null terminated. This flaw most likely leads to a crash, but can also lead to heap contents getting returned to the application when [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used.
References
Link Resource
http://www.openwall.com/lists/oss-security/2024/07/31/1 Mailing List
https://curl.se/docs/CVE-2024-7264.html Vendor Advisory
https://curl.se/docs/CVE-2024-7264.json Vendor Advisory
https://hackerone.com/reports/2629968 Exploit Issue Tracking Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*

History

12 Aug 2024, 17:30

Type Values Removed Values Added
CWE CWE-125
CPE cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
First Time Haxx
Haxx libcurl
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
References () http://www.openwall.com/lists/oss-security/2024/07/31/1 - () http://www.openwall.com/lists/oss-security/2024/07/31/1 - Mailing List
References () https://curl.se/docs/CVE-2024-7264.html - () https://curl.se/docs/CVE-2024-7264.html - Vendor Advisory
References () https://curl.se/docs/CVE-2024-7264.json - () https://curl.se/docs/CVE-2024-7264.json - Vendor Advisory
References () https://hackerone.com/reports/2629968 - () https://hackerone.com/reports/2629968 - Exploit, Issue Tracking, Permissions Required, Third Party Advisory

31 Jul 2024, 10:15

Type Values Removed Values Added
Summary
  • (es) El código del analizador ASN1 de libcurl tiene la función `GTime2str()`, que se utiliza para analizar un campo de tiempo generalizado ASN.1. Si se proporciona un campo sintácticamente incorrecto, el analizador puede terminar usando -1 para la longitud de la *time fraction*, lo que lleva a que se ejecute una `strlen()` en un puntero a un área de búfer de almacenamiento dinámico que no está (intencionadamente) terminada en nulo. Este fallo probablemente lleve a un bloqueo, pero también puede llevar a que se devuelvan contenidos del montón a la aplicación cuando se utiliza [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html).
References
  • () http://www.openwall.com/lists/oss-security/2024/07/31/1 -

31 Jul 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-31 08:15

Updated : 2024-10-30 20:35


NVD link : CVE-2024-7264

Mitre link : CVE-2024-7264

CVE.ORG link : CVE-2024-7264


JSON object : View

Products Affected

haxx

  • libcurl
CWE
CWE-125

Out-of-bounds Read