| Summary | A vulnerability in input validation exists in curl <8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and "telnet options" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application's intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system. |
|---|---|
| Publication Date | March 31, 2023, 5:15 a.m. |
| Registration Date | March 31, 2023, 10 a.m. |
| Last Update | Nov. 21, 2024, 4:53 p.m. |
| CVSS3.1 : HIGH | |
| スコア | 8.8 |
|---|---|
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 不要 |
| 利用者の関与(UI) | 要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* | 7.0.0 | 7.881 | |||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* | |||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* | |||||
| cpe:2.3:a:netapp:clustered_data_ontap:9.0:-:*:*:*:*:*:* | |||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* | ||||
| Configuration5 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* | ||||
| Configuration6 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* | ||||
| Configuration7 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* | ||||
| Configuration8 | or higher | or less | more than | less than | |
| cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:* | 9.0.0 | 9.0.6 | |||
| cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:* | 8.2.0 | 8.2.12 | |||
| Title | Haxx の cURL 他複数ベンダの製品におけるインジェクションに関する脆弱性 |
|---|---|
| Summary | Haxx の cURL 他複数ベンダの製品には、インジェクションに関する脆弱性が存在します。 |
| Possible impacts | 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | 参考情報を参照して適切な対策を実施してください。 |
| Publication Date | March 30, 2023, midnight |
| Registration Date | Nov. 15, 2023, 12:21 p.m. |
| Last Update | Dec. 21, 2023, 11:29 a.m. |
| Fedora Project |
| Fedora 36 |
| Haxx |
| cURL 7.0.0 から 7.881 |
| NetApp |
| Active IQ Unified Manager |
| H300S ファームウェア |
| H410S ファームウェア |
| H500S ファームウェア |
| H700S ファームウェア |
| ONTAP (旧 Clustered Data ONTAP) 9.0 |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2023年11月15日] 掲載 |
Nov. 15, 2023, 12:21 p.m. |
| 3 | [2023年12月21日] 参考情報:JVN (JVNVU#98271228) を追加 参考情報:ICS-CERT ADVISORY (ICSA-23-348-10) を追加 |
Dec. 21, 2023, 10:17 a.m. |