Unknown
CVE-2022-32206
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2022-32206
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
curl < 7.84.0 supports “chained” HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable “links” in this “decompression chain” was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a “malloc bomb”, makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- debian,
- fedoraproject,
- haxx,
- netapp,
- siemens,
- splunk
Products
- bootstrap os -,
- clustered data ontap -,
- curl,
- debian linux 10.0,
- debian linux 11.0,
- element software -,
- fedora 35,
- h300s firmware -,
- h410s firmware -,
- h500s firmware -,
- h700s firmware -,
- hci management node -,
- scalance sc622-2c firmware,
- scalance sc626-2c firmware,
- scalance sc632-2c firmware,
- scalance sc636-2c firmware,
- scalance sc642-2c firmware,
- scalance sc646-2c firmware,
- solidfire -,
- universal forwarder,
- universal forwarder 9.1.0
References
Advisory
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: