CVE-2023-28319: UAF in SSH sha256 fingerprint check

Disclosed: 2023-06-25 18:16:40 By wct To ibb
Medium
Vulnerability Details
libcurl offers a feature to verify an SSH server's public key using a SHA 256 hash. When this check fails, libcurl would free the memory for the fingerprint before it returns an error message containing the (now freed) hash. Affected versions: curl 7.81.0 to and including 8.0.1 Not affected versions: curl < 7.81.0 and curl >= 8.1.0 The original submission can be found here: https://hackerone.com/reports/1913733 ## Impact This flaw risks inserting sensitive heap-based data into the error message that might be shown to users or otherwise get leaked and revealed.
Actions
View on HackerOne
Report Stats
  • Report ID: 1997312
  • State: Closed
  • Substate: resolved
  • Upvotes: 2
Share this report