Vulnerability Description
libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect field, the parser might end up using -1 for the length of the *time fraction*, leading to a `strlen()` getting performed on a pointer to a heap buffer area that is not (purposely) null terminated. This flaw most likely leads to a crash, but can also lead to heap contents getting returned to the application when [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Haxx | Libcurl | >= 7.32.0, < 8.9.1 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2024/07/31/1Mailing List
- https://curl.se/docs/CVE-2024-7264.htmlVendor Advisory
- https://curl.se/docs/CVE-2024-7264.jsonVendor Advisory
- https://hackerone.com/reports/2629968ExploitIssue TrackingPermissions Required
- http://www.openwall.com/lists/oss-security/2024/07/31/1Mailing List
- https://github.com/curl/curl/commit/27959ecce75cdb2809c0bdb3286e60e08fadb519
- https://security.netapp.com/advisory/ntap-20240828-0008/
- https://security.netapp.com/advisory/ntap-20241025-0006/
- https://security.netapp.com/advisory/ntap-20241025-0010/
FAQ
What is CVE-2024-7264?
CVE-2024-7264 is a vulnerability with a CVSS score of 6.5 (MEDIUM). libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect field, the parser might end up using -1 for the length ...
How severe is CVE-2024-7264?
CVE-2024-7264 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-7264?
Check the references section above for vendor advisories and patch information. Affected products include: Haxx Libcurl.