HomeHaxxCVE-2023-23916

CVE-2023-23916

MEDIUM
6.5CVSS
Published: 2023-02-23
Updated: 2025-03-12
AI Analysis

Description

An allocation of resources without limits or throttling vulnerability exists in curl <v7.88.0 based on the "chained" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable "links" in this "decompression chain" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a "malloc bomb", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Attack Vector
network
Complexity
low
Privileges
none
User Action
required
Scope
unchanged
Confidentiality
none
Integrity
none
Availability
high
Weaknesses
CWE-770CWE-770CWE-770

Metadata

Primary Vendor
HAXX
Published
2/23/2023
Last Modified
3/12/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

haxx : curlfedoraproject : fedoradebian : debian_linuxdebian : debian_linuxnetapp : h300s_firmwarenetapp : h500s_firmwarenetapp : h700s_firmwarenetapp : h410s_firmwarenetapp : clustered_data_ontapsplunk : universal_forwardersplunk : universal_forwardersplunk : universal_forwarder

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2023-23916 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com