CVE-2021-22925
MEDIUM | Platform: macOS | Changelog
CVE Details
Description
curl supports the -t command line option, known as CURLOPT_TELNETOPTIONSin libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending NEW_ENV variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.
CVSS 3.1 Score
| Metric | Value |
|---|---|
| Base Score | 5.3 (MEDIUM) |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
Weakness
References
- Apple Security Advisory
- NVD Entry
- http://seclists.org/fulldisclosure/2021/Sep/39 (Mailing List, Third Party Advisory)
- http://seclists.org/fulldisclosure/2021/Sep/40 (Mailing List, Third Party Advisory)
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf (Patch, Third Party Advisory)
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf (Third Party Advisory)
- https://hackerone.com/reports/1223882 (Exploit, Issue Tracking, Patch, Third Party Advisory)
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ (Mailing List, Third Party Advisory)
- https://security.gentoo.org/glsa/202212-01 (Third Party Advisory)
- https://security.netapp.com/advisory/ntap-20210902-0003/ (Third Party Advisory)