Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Required
Privileges Required
None
Attack Vector
Network
0

CVE-2022-32206

Disclosure Date: July 07, 2022
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

curl < 7.84.0 supports “chained” HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable “links” in this “decompression chain” was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a “malloc bomb”, makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
6.5 Medium
Impact Score:
3.6
Exploitability Score:
2.8
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
Required
Scope (S):
Unchanged
Confidentiality (C):
None
Integrity (I):
None
Availability (A):
High

General Information

Vendors

  • debian,
  • fedoraproject,
  • haxx,
  • netapp,
  • siemens,
  • splunk

Products

  • bootstrap os -,
  • clustered data ontap -,
  • curl,
  • debian linux 10.0,
  • debian linux 11.0,
  • element software -,
  • fedora 35,
  • h300s firmware -,
  • h410s firmware -,
  • h500s firmware -,
  • h700s firmware -,
  • hci management node -,
  • scalance sc622-2c firmware,
  • scalance sc626-2c firmware,
  • scalance sc632-2c firmware,
  • scalance sc636-2c firmware,
  • scalance sc642-2c firmware,
  • scalance sc646-2c firmware,
  • solidfire -,
  • universal forwarder,
  • universal forwarder 9.1.0
Technical Analysis