🛡 H3lium@infosec.exchange/:~# :blinking_cursor:<p>"🚨 curl Vulnerability Alert: SOCKS5 Heap Buffer Overflow 🚨"</p><p>A critical heap buffer overflow vulnerability has been identified in <code>curl</code>, specifically in the SOCKS5 proxy handshake. When curl is instructed to pass the hostname to the SOCKS5 proxy for resolution, a hostname exceeding 255 bytes should trigger local name resolving. However, due to a bug, a slow SOCKS5 handshake might erroneously copy an overly long hostname to the target buffer instead of just the resolved address, causing a potential overflow. 🐛💻🔥</p><p>This flaw, tagged as CVE-2023-38545, affects libcurl versions 7.69.0 to 8.3.0 and has been assigned a high severity rating. The vulnerability was introduced when the SOCKS5 handshake code transitioned from a blocking function to a non-blocking state machine. The issue has been resolved in curl version 8.4.0, and users are urged to upgrade or apply patches to mitigate risks. 🛡️🔄</p><p>Source: <a href="https://curl.se/docs/CVE-2023-38545.html" rel="nofollow noopener" target="_blank">curl - CVE-2023-38545</a></p><p>Tags: <a href="https://infosec.exchange/tags/curl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>curl</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/CVE202338545" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE202338545</span></a> <a href="https://infosec.exchange/tags/BufferOverflow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BufferOverflow</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/PatchManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchManagement</span></a> <a href="https://infosec.exchange/tags/CyberHygiene" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberHygiene</span></a></p><p>👥 Credits: Reported and patched by Jay Satiro. A heartfelt thanks to Jay for enhancing the security of the digital realm!</p><p>🔗 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545" rel="nofollow noopener" target="_blank">MITRE CVE-2023-38545</a></p><p>🛠️ <strong>Recommendations:</strong></p><ol><li><strong>Upgrade</strong>: Update curl to version 8.4.0 or a newer release where the issue is fixed.</li><li><strong>Patch</strong>: If upgrading is not feasible, consider applying the provided patch to your local version of curl.</li><li><strong>Proxy Configuration</strong>: Avoid using CURLPROXY_SOCKS5_HOSTNAME proxies with curl.</li><li><strong>Environment Variables</strong>: Do not set proxy environment variables to socks5h://.</li></ol>