摘要:
libcurl's URL API function
[curl_url_get()](https://curl.se/libcurl/c/curl_url_get.html) offers punycode
conversions, to and from IDN. Asking to convert a name that is exactly 256
bytes, libcurl ends up reading outside of a stack based buffer when built to
use the *macidn* IDN backend. The conversion function then fills up the
provided buffer exactly - but does not null terminate the string.
This flaw can lead to stack contents accidently getting returned as part of
the converted string.
安全等级: Low
公告ID: KylinSec-SA-2024-3219
发布日期: 2024年7月26日
关联CVE: CVE-2024-6874
libcurl's URL API function
[curl_url_get()](https://curl.se/libcurl/c/curl_url_get.html) offers punycode
conversions, to and from IDN. Asking to convert a name that is exactly 256
bytes, libcurl ends up reading outside of a stack based buffer when built to
use the *macidn* IDN backend. The conversion function then fills up the
provided buffer exactly - but does not null terminate the string.
This flaw can lead to stack contents accidently getting returned as part of
the converted string.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-6874 | KY3.4-5A | curl | Unaffected |
CVE-2024-6874 | KY3.5.2 | curl | Unaffected |
CVE-2024-6874 | V6 | curl | Unaffected |