Vulnerability Description
curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Haxx | Curl | < 7.84.0 |
| Fedoraproject | Fedora | 35 |
| Debian | Debian Linux | 10.0 |
| Netapp | Clustered Data Ontap | - |
| Netapp | Element Software | - |
| Netapp | Hci Management Node | - |
| Netapp | Solidfire | - |
| Netapp | Hci Compute Node | - |
| Netapp | Bootstrap Os | - |
| Netapp | H300S | - |
| Netapp | H300S Firmware | - |
| Netapp | H500S | - |
| Netapp | H500S Firmware | - |
| Netapp | H700S | - |
| Netapp | H700S Firmware | - |
| Netapp | H410S | - |
| Netapp | H410S Firmware | - |
| Siemens | Scalance Sc622-2C | - |
| Siemens | Scalance Sc622-2C Firmware | < 3.0 |
| Siemens | Scalance Sc626-2C | - |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2022/Oct/28Mailing ListThird Party Advisory
- http://seclists.org/fulldisclosure/2022/Oct/41Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2023/02/15/3Mailing ListThird Party Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdfPatchThird Party Advisory
- https://hackerone.com/reports/1570651ExploitThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/08/msg00017.htmlMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/202212-01Third Party Advisory
- https://security.netapp.com/advisory/ntap-20220915-0003/Third Party Advisory
- https://support.apple.com/kb/HT213488Third Party Advisory
- https://www.debian.org/security/2022/dsa-5197Third Party Advisory
- http://seclists.org/fulldisclosure/2022/Oct/28Mailing ListThird Party Advisory
- http://seclists.org/fulldisclosure/2022/Oct/41Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2023/02/15/3Mailing ListThird Party Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdfPatchThird Party Advisory
FAQ
What is CVE-2022-32206?
CVE-2022-32206 is a vulnerability with a CVSS score of 6.5 (MEDIUM). curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links"...
How severe is CVE-2022-32206?
CVE-2022-32206 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-32206?
Check the references section above for vendor advisories and patch information. Affected products include: Haxx Curl, Fedoraproject Fedora, Debian Debian Linux, Netapp Clustered Data Ontap, Netapp Element Software.