Skip to main content
Version: latest

CVE-2024-6197

CVE Details

Visit the official vulnerability details page for CVE-2024-6197 to learn more.

Initial Publication

10/26/2024

Last Update

12/16/2024

Third Party Dependency

curl

NIST CVE Summary

libcurl's ASN1 parser has this utf8asn1str() function used for parsing an ASN.1 UTF-8 string. Itcan detect an invalid field and return error. Unfortunately, when doing so it also invokes `free()` on a 4 byte localstack buffer. Most modern malloc implementations detect this error and immediately abort. Some however accept the input pointer and add that memory to its list of available chunks. This leads to the overwriting of nearby stack memory. The content of the overwrite is decided by the `free()` implementation; likely to be memory pointers and a set of flags. The most likely outcome of exploting this flaw is a crash, although it cannot be ruled out that more serious results can be had in special circumstances.

CVE Severity

7.5

Our Official Summary

This CVE is reported on nginx-ingress-controller image on the libcurl's ASN1 parser. The vulnerable code path can be triggered by a malicious operation offering an especially crafted TLS certificate. Problem is fixed in curl version >=8.9.0.

Attackers would also need privilged access to cluster running the container as these containers are not exposed beyond the cluster boundary. Risk of explotation is low as well as the impact since the container restricts the attack surface.

Status

Ongoing

Affected Products & Versions

VersionPalette EnterprisePalette Enterprise AirgapVerteXVerteX Airgap
4.5.15⚠️ Impacted⚠️ Impacted✅ No Impact✅ No Impact
4.5.10⚠️ Impacted⚠️ Impacted✅ No Impact✅ No Impact
4.5.8⚠️ Impacted⚠️ Impacted✅ No Impact✅ No Impact
4.5.5⚠️ Impacted⚠️ Impacted✅ No Impact✅ No Impact
4.5.4⚠️ Impacted⚠️ Impacted✅ No Impact✅ No Impact
4.4.20⚠️ Impacted⚠️ Impacted✅ No Impact✅ No Impact

Revision History

DateRevision
12/16/2024Impacted versions changed from 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10 to 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10, 4.5.15
12/11/2024Official summary revised: This CVE is reported on nginx-ingress-controller image on the libcurl's ASN1 parser. The vulnerable code path can be triggered by a malicious operation offering an especially crafted TLS certificate. Problem is fixed in curl version >=8.9.0. Attackers would also need privilged access to cluster running the container as these containers are not exposed beyond the cluster boundary. Risk of explotation is low as well as the impact since the container restricts the attack surface.
11/15/2024Impacted versions changed from 4.5.4, 4.5.5, 4.5.8, 4.4.20 to 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10
11/13/2024Impacted versions changed from 4.5.4, 4.5.5, 4.5.8 to 4.5.4, 4.5.5, 4.5.8, 4.4.20
11/12/2024Impacted versions changed from 4.5.4, 4.5.5 to 4.5.4, 4.5.5, 4.5.8
10/27/2024Impacted versions changed from 4.5.4 to 4.5.4, 4.5.5