CVE-2022-43552

A use after free vulnerability exists in curl <7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.
References
Link Resource
http://seclists.org/fulldisclosure/2023/Mar/17 Mailing List Third Party Advisory
https://hackerone.com/reports/1764858 Exploit Issue Tracking Third Party Advisory
https://security.gentoo.org/glsa/202310-12 Third Party Advisory
https://security.netapp.com/advisory/ntap-20230214-0002/ Vendor Advisory
https://support.apple.com/kb/HT213670 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*

History

27 Mar 2024, 14:55

Type Values Removed Values Added
First Time Splunk
Splunk universal Forwarder
CPE cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*

20 Oct 2023, 18:57

Type Values Removed Values Added
CPE cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
First Time Apple macos
Apple
References (CONFIRM) https://support.apple.com/kb/HT213670 - (CONFIRM) https://support.apple.com/kb/HT213670 - Third Party Advisory
References (GENTOO) https://security.gentoo.org/glsa/202310-12 - (GENTOO) https://security.gentoo.org/glsa/202310-12 - Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Mar/17 - (FULLDISC) http://seclists.org/fulldisclosure/2023/Mar/17 - Mailing List, Third Party Advisory

11 Oct 2023, 11:15

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202310-12 -

28 Mar 2023, 05:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Mar/17 -

28 Mar 2023, 02:15

Type Values Removed Values Added
References
  • (CONFIRM) https://support.apple.com/kb/HT213670 -

21 Feb 2023, 19:44

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 5.9

17 Feb 2023, 16:07

Type Values Removed Values Added
First Time Haxx curl
Haxx
CPE cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
References (CONFIRM) https://security.netapp.com/advisory/ntap-20230214-0002/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20230214-0002/ - Vendor Advisory
References (MISC) https://hackerone.com/reports/1764858 - (MISC) https://hackerone.com/reports/1764858 - Exploit, Issue Tracking, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-416

14 Feb 2023, 13:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20230214-0002/ -

09 Feb 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-02-09 20:15

Updated : 2024-03-27 14:55


NVD link : CVE-2022-43552

Mitre link : CVE-2022-43552

CVE.ORG link : CVE-2022-43552


JSON object : View

Products Affected

splunk

  • universal_forwarder

haxx

  • curl

apple

  • macos
CWE
CWE-416

Use After Free