curl use of connection struct after free

2016.08.05
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-416


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

use of connection struct after free =================================== Project cURL Security Advisory, August 3rd 2016 - [Permalink](https://curl.haxx.se/docs/adv_20160803C.html) VULNERABILITY ------------- libcurl is vulnerable to a use-after-free flaw. libcurl works with easy handles using the type 'CURL *' that are objects the application creates using curl_easy_init(). They are the handles that are all each associated with a single transfer at a time. libcurl also has an internal struct that represents and holds most state that is related to a single connection. An easy handle can hold references to one or many such connection structs depending on the requested operations. When using libcurl's multi interface, an application performs transfers by adding one or more easy handles to the multi handle and then it can drive all those transfers in parallel. Due to a flaw, libcurl could leave a pointer to a freed connection struct dangling in an easy handle that was previously added to a multi handle when curl_multi_cleanup() is called with an easy handle still added to it. This does not seem to cause any notable harm if the handle is then closed properly. However, if the easy handle would instead get used again with the easy interface and curl_easy_perform() to do another transfer, it would blindly use the connection struct pointer now pointing to freed memory. An application could be made to allocate its own fake version of the connect struct, fill in some data and then have the curl_easy_perform() call do something that clearly was not intended by the original code. For example, this could be an application using a component or library that uses libcurl to do something against fixed URLs or fixed host names or with a set of fixed options, but using this flaw the application can then make the component to do something completely different and unintended. Pseudo code for a bad application easy = curl_easy_init(); curl_easy_setopt(easy, CURLOPT_URL, "http://example.com/";); // --- start of code to confuse libcurl --- multi = curl_multi_init(); curl_multi_add_handle(multi, easy); curl_multi_perform(multi, &still_running); curl_multi_cleanup(multi); // --- attack code allocate_fake_connection_struct() fill_in_fake_connection_struct() // ---- end of confusion code // now this is called, it will not use example.com at all even if the // option above asks for it... curl_easy_perform(easy); This flaw can also be exploited using libcurl bindings in other languages. We are not aware of any exploit of this flaw. INFO ---- This flaw does not affect the curl command line tool. The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2016-5421 to this issue. AFFECTED VERSIONS ----------------- - Affected versions: libcurl 7.32.0 to and including 7.50.0 - Not affected versions: libcurl >= 7.50.1 libcurl is used by many applications, but not always advertised as such! THE SOLUTION ------------ In version 7.50.1, curl clears the memory pointer immediately after free thus removing this vulnerability. A [patch for CVE-2016-5421](https://curl.haxx.se/CVE-2016-5421.patch) is available. RECOMMENDATIONS --------------- We suggest you take one of the following actions immediately, in order of preference: A - Upgrade curl and libcurl to version 7.50.1 B - Apply the patch to your version and rebuild C - Do not expose easy handles from your libcurl using components TIME LINE --------- Reported on July 3, 2016. We contacted distros@openwall on July 31. libcurl 7.50.1 was released on August 3 2016, coordinated with the publication of this advisory. CREDITS ------- Found and explained to us by Marcelo Echeverria and Fernando Muñoz. Thanks a lot! -- / daniel.haxx.se

References:

https://curl.haxx.se/CVE-2016-5421.patch


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top