CVE-2021-22925

medium

Description

curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.

References

https://www.oracle.com/security-alerts/cpuoct2021.html

https://www.oracle.com/security-alerts/cpujan2022.html

https://support.apple.com/kb/HT212805

https://support.apple.com/kb/HT212804

https://security.netapp.com/advisory/ntap-20210902-0003/

https://security.gentoo.org/glsa/202212-01

https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/

https://hackerone.com/reports/1223882

https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf

https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf

http://seclists.org/fulldisclosure/2021/Sep/40

http://seclists.org/fulldisclosure/2021/Sep/39

Details

Source: Mitre, NVD

Published: 2021-08-05

Updated: 2024-03-27

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Severity: Medium