CVE-2024-6874

libcurl's URL API function [curl_url_get()](https://curl.se/libcurl/c/curl_url_get.html) offers punycode conversions, to and from IDN. Asking to convert a name that is exactly 256 bytes, libcurl ends up reading outside of a stack based buffer when built to use the *macidn* IDN backend. The conversion function then fills up the provided buffer exactly - but does not null terminate the string. This flaw can lead to stack contents accidently getting returned as part of the converted string.
References
Link Resource
https://curl.se/docs/CVE-2024-6874.json Vendor Advisory
https://curl.se/docs/CVE-2024-6874.html Vendor Advisory
https://hackerone.com/reports/2604391 Exploit Issue Tracking Technical Description
http://www.openwall.com/lists/oss-security/2024/07/24/2 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:libcurl:8.8.0:*:*:*:*:*:*:*

History

10 Sep 2024, 15:27

Type Values Removed Values Added
CWE CWE-125
CPE cpe:2.3:a:haxx:libcurl:8.8.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
References () https://curl.se/docs/CVE-2024-6874.json - () https://curl.se/docs/CVE-2024-6874.json - Vendor Advisory
References () https://curl.se/docs/CVE-2024-6874.html - () https://curl.se/docs/CVE-2024-6874.html - Vendor Advisory
References () https://hackerone.com/reports/2604391 - () https://hackerone.com/reports/2604391 - Exploit, Issue Tracking, Technical Description
References () http://www.openwall.com/lists/oss-security/2024/07/24/2 - () http://www.openwall.com/lists/oss-security/2024/07/24/2 - Mailing List, Third Party Advisory
First Time Haxx libcurl
Haxx

24 Jul 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-24 08:15

Updated : 2024-09-10 15:27


NVD link : CVE-2024-6874

Mitre link : CVE-2024-6874


JSON object : View

Products Affected

haxx

  • libcurl
CWE
CWE-125

Out-of-bounds Read