CVE-2022-43552

A use after free vulnerability exists in curl <7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.
References
Link Resource
http://seclists.org/fulldisclosure/2023/Mar/17 Mailing List Third Party Advisory
https://hackerone.com/reports/1764858 Exploit Issue Tracking Third Party Advisory
https://security.gentoo.org/glsa/202310-12 Third Party Advisory
https://security.netapp.com/advisory/ntap-20230214-0002/ Vendor Advisory
https://support.apple.com/kb/HT213670 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-02-09 20:15

Updated : 2024-03-27 14:55


NVD link : CVE-2022-43552

Mitre link : CVE-2022-43552

CVE.ORG link : CVE-2022-43552


JSON object : View

Products Affected

splunk

  • universal_forwarder

apple

  • macos

haxx

  • curl
CWE
CWE-416

Use After Free