curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| haxx | curl | 7.84.0 | - |
| fedoraproject | fedora | - | - |
| debian | debian_linux | - |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
22
Affected Products
22
References
haxx / curl
| - |
| debian | debian_linux | - | - |
| netapp | clustered_data_ontap | - | - |
| netapp | element_software | - | - |
| netapp | hci_management_node | - | - |
| netapp | solidfire | - | - |
| netapp | bootstrap_os | - | - |
| netapp | h300s_firmware | - | - |
| netapp | h500s_firmware | - | - |
| netapp | h700s_firmware | - | - |
| netapp | h410s_firmware | - | - |
| siemens | scalance_sc622-2c_firmware | 3.0 | - |
| siemens | scalance_sc626-2c_firmware | 3.0 | - |
| siemens | scalance_sc632-2c_firmware | 3.0 | - |
| siemens | scalance_sc636-2c_firmware | 3.0 | - |
| siemens | scalance_sc642-2c_firmware | 3.0 | - |
| siemens | scalance_sc646-2c_firmware | 3.0 | - |
| splunk | universal_forwarder | 8.2.0 - 8.2.12 | - |
| splunk | universal_forwarder | 9.0.0 - 9.0.6 | - |
| splunk | universal_forwarder | - | - |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Exploitability
Impact