CVE-2022-32206
high-risk
Published 2022-07-07
curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.
Do I need to act?
~
4.5% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10
Medium
NETWORK
/ LOW complexity
Affected Products (20)
Scalance Sc622-2C Firmware
Scalance Sc626-2C Firmware
Scalance Sc632-2C Firmware
Scalance Sc636-2C Firmware
Scalance Sc642-2C Firmware
Scalance Sc646-2C Firmware
References (22)
Mailing List
http://seclists.org/fulldisclosure/2022/Oct/28
Mailing List
http://seclists.org/fulldisclosure/2022/Oct/41
Third Party Advisory
https://security.gentoo.org/glsa/202212-01
Third Party Advisory
https://security.netapp.com/advisory/ntap-20220915-0003/
Third Party Advisory
https://support.apple.com/kb/HT213488
Third Party Advisory
https://www.debian.org/security/2022/dsa-5197
Mailing List
http://seclists.org/fulldisclosure/2022/Oct/28
Mailing List
http://seclists.org/fulldisclosure/2022/Oct/41
Third Party Advisory
https://security.gentoo.org/glsa/202212-01
Third Party Advisory
https://security.netapp.com/advisory/ntap-20220915-0003/
and 2 more references
52
/ 100
high-risk
Severity
24/34 · High
Exploitability
8/34 · Low
Exposure
20/34 · Moderate