CURL-CVE-2024-6874

Source
https://curl.se/docs/CVE-2024-6874.html
Import Source
https://curl.se/docs/CURL-CVE-2024-6874.json
JSON Data
https://api.test.osv.dev/v1/vulns/CURL-CVE-2024-6874
Aliases
Published
2024-07-24T08:00:00Z
Modified
2024-08-07T14:48:26Z
Summary
macidn punycode buffer overread
Details

libcurl's URL API function curlurlget() offers punycode conversions, to and from IDN. Asking to convert a name that is exactly 256 bytes, libcurl ends up reading outside of a stack based buffer when built to use the macidn IDN backend. The conversion function then fills up the provided buffer exactly - but does not null terminate the string.

This flaw can lead to stack contents accidentally getting returned as part of the converted string.

Database specific
{
    "CWE": {
        "id": "CWE-126",
        "desc": "Buffer Over-read"
    },
    "award": {
        "amount": "540",
        "currency": "USD"
    },
    "URL": "https://curl.se/docs/CVE-2024-6874.json",
    "package": "curl",
    "severity": "Low",
    "issue": "https://hackerone.com/reports/2604391",
    "www": "https://curl.se/docs/CVE-2024-6874.html",
    "last_affected": "8.8.0"
}
References
Credits
    • z2_ - FINDER
    • z2_ - REMEDIATION_DEVELOPER

Affected packages

Git / github.com/curl/curl.git

Affected ranges

Type
SEMVER
Events
Introduced
8.8.0
Fixed
8.9.0
Type
GIT
Repo
https://github.com/curl/curl.git
Events

Affected versions

8.*

8.8.0