How I made a heap overflow in #curl
Let me talk CVE-2023-38545 a bit
https://daniel.haxx.se/blog/2023/10/11/how-i-made-a-heap-overflow-in-curl/
How I made a heap overflow in #curl Let me talk CVE-2023-38545 a bit https://daniel.haxx.se/blog/2023/10/11/how-i-made-a-heap-overflow-in-curl/ 14 comments
@bagder Thanks for the clear and detailed write up. @bagder great explainer. You mention the hackerone report at the end - maybe worth linking it? I had to google it. @bagder refactoring is always risky. Kinda wonder what an exploit scenario would look like though; it has to be a malicious server, the user has to be intentionally trying to reach it via SOCKS, and they must have some kind of ongoing service relationship for the server to have fingerprinted the client well enough to push an effective payload. @hyc yeah. Perhaps most realistically, a Tor user (which normally uses SOCKS5) going to a HTTPS site that has been breached or similar |
@bagder "Typical server latency is likely "slow" enough to trigger this bug"
Nitpicking - but if it's the typical case it sounds a bit strange to refer to it as slow? :)