Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2023-23914 CVE-2023-23915 CVE-2023-23916 |
CWE-ID | CWE-319 CWE-770 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Amazon Linux AMI Operating systems & Components / Operating system curl Operating systems & Components / Operating system package or component |
Vendor | Amazon Web Services |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU72335
Risk: Medium
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-23914
CWE-ID:
CWE-319 - Cleartext Transmission of Sensitive Information
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to state issues when handling multiple requests, which results in ignoring HSTS support. A remote attacker can perform MitM attack. MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
libcurl-debuginfo-7.88.0-1.amzn2023.0.1.aarch64
libcurl-minimal-7.88.0-1.amzn2023.0.1.aarch64
curl-minimal-7.88.0-1.amzn2023.0.1.aarch64
curl-debuginfo-7.88.0-1.amzn2023.0.1.aarch64
libcurl-7.88.0-1.amzn2023.0.1.aarch64
curl-debugsource-7.88.0-1.amzn2023.0.1.aarch64
libcurl-minimal-debuginfo-7.88.0-1.amzn2023.0.1.aarch64
curl-7.88.0-1.amzn2023.0.1.aarch64
curl-minimal-debuginfo-7.88.0-1.amzn2023.0.1.aarch64
libcurl-devel-7.88.0-1.amzn2023.0.1.aarch64
src:
curl-7.88.0-1.amzn2023.0.1.src
x86_64:
curl-minimal-debuginfo-7.88.0-1.amzn2023.0.1.x86_64
curl-debugsource-7.88.0-1.amzn2023.0.1.x86_64
curl-debuginfo-7.88.0-1.amzn2023.0.1.x86_64
libcurl-minimal-7.88.0-1.amzn2023.0.1.x86_64
libcurl-debuginfo-7.88.0-1.amzn2023.0.1.x86_64
curl-minimal-7.88.0-1.amzn2023.0.1.x86_64
libcurl-minimal-debuginfo-7.88.0-1.amzn2023.0.1.x86_64
curl-7.88.0-1.amzn2023.0.1.x86_64
libcurl-7.88.0-1.amzn2023.0.1.x86_64
libcurl-devel-7.88.0-1.amzn2023.0.1.x86_64
Amazon Linux AMI: All versions
curl: All versions
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-114.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72336
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-23915
CWE-ID:
CWE-319 - Cleartext Transmission of Sensitive Information
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to state issues when handling multiple transfers in parallel, which results in ignoring HSTS support. A remote attacker can perform MitM attack. MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
libcurl-debuginfo-7.88.0-1.amzn2023.0.1.aarch64
libcurl-minimal-7.88.0-1.amzn2023.0.1.aarch64
curl-minimal-7.88.0-1.amzn2023.0.1.aarch64
curl-debuginfo-7.88.0-1.amzn2023.0.1.aarch64
libcurl-7.88.0-1.amzn2023.0.1.aarch64
curl-debugsource-7.88.0-1.amzn2023.0.1.aarch64
libcurl-minimal-debuginfo-7.88.0-1.amzn2023.0.1.aarch64
curl-7.88.0-1.amzn2023.0.1.aarch64
curl-minimal-debuginfo-7.88.0-1.amzn2023.0.1.aarch64
libcurl-devel-7.88.0-1.amzn2023.0.1.aarch64
src:
curl-7.88.0-1.amzn2023.0.1.src
x86_64:
curl-minimal-debuginfo-7.88.0-1.amzn2023.0.1.x86_64
curl-debugsource-7.88.0-1.amzn2023.0.1.x86_64
curl-debuginfo-7.88.0-1.amzn2023.0.1.x86_64
libcurl-minimal-7.88.0-1.amzn2023.0.1.x86_64
libcurl-debuginfo-7.88.0-1.amzn2023.0.1.x86_64
curl-minimal-7.88.0-1.amzn2023.0.1.x86_64
libcurl-minimal-debuginfo-7.88.0-1.amzn2023.0.1.x86_64
curl-7.88.0-1.amzn2023.0.1.x86_64
libcurl-7.88.0-1.amzn2023.0.1.x86_64
libcurl-devel-7.88.0-1.amzn2023.0.1.x86_64
Amazon Linux AMI: All versions
curl: All versions
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-114.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72337
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-23916
CWE-ID:
CWE-770 - Allocation of Resources Without Limits or Throttling
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect implementation of the "chained" HTTP compression algorithms, where the number of links in the decompression chain was limited for each header instead of the entire request. A remote attacker can send a specially crafted compressed HTTP request with numerous headers and perform a denial of service (DoS) attack.
Update the affected packages:
aarch64:Vulnerable software versions
libcurl-debuginfo-7.88.0-1.amzn2023.0.1.aarch64
libcurl-minimal-7.88.0-1.amzn2023.0.1.aarch64
curl-minimal-7.88.0-1.amzn2023.0.1.aarch64
curl-debuginfo-7.88.0-1.amzn2023.0.1.aarch64
libcurl-7.88.0-1.amzn2023.0.1.aarch64
curl-debugsource-7.88.0-1.amzn2023.0.1.aarch64
libcurl-minimal-debuginfo-7.88.0-1.amzn2023.0.1.aarch64
curl-7.88.0-1.amzn2023.0.1.aarch64
curl-minimal-debuginfo-7.88.0-1.amzn2023.0.1.aarch64
libcurl-devel-7.88.0-1.amzn2023.0.1.aarch64
src:
curl-7.88.0-1.amzn2023.0.1.src
x86_64:
curl-minimal-debuginfo-7.88.0-1.amzn2023.0.1.x86_64
curl-debugsource-7.88.0-1.amzn2023.0.1.x86_64
curl-debuginfo-7.88.0-1.amzn2023.0.1.x86_64
libcurl-minimal-7.88.0-1.amzn2023.0.1.x86_64
libcurl-debuginfo-7.88.0-1.amzn2023.0.1.x86_64
curl-minimal-7.88.0-1.amzn2023.0.1.x86_64
libcurl-minimal-debuginfo-7.88.0-1.amzn2023.0.1.x86_64
curl-7.88.0-1.amzn2023.0.1.x86_64
libcurl-7.88.0-1.amzn2023.0.1.x86_64
libcurl-devel-7.88.0-1.amzn2023.0.1.x86_64
Amazon Linux AMI: All versions
curl: All versions
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-114.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.