Patch

CVE-2023-38545

with vRx

Vulnerability Overview
CVE Name
CVE-2023-38545
Severity
9.8
Critical
CVE Description
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. When curl is asked to pass along the host name to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that host...
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. When curl is asked to pass along the host name to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that host...
Show more
Show less
Latest Patch info
Patch Name
https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/
Date
16.11.2023
Script
Script Type
Remediation script
Overview This script is designed to detect and remediate a specific vulnerability in curl and libcurl versions on UNIX-like systems. The vulnerability involves a heap-based buffer overflow during the SOCKS5 proxy handshake. The script checks for vulnerable curl versions, removes potentially insecure configurations from the .curlrc file, and unsets vulnerable environment variables. Functionality 1. command_exists: This function checks if a command is available in the system's PATH. 2. get_curl_version: Retrieves the version of curl installed on the system. 3. is_vulnerable_curl_version: Determines if the detected curl version falls within a vulnerable range. 4. remove_vulnerable_config: Removes vulnerable configurations from the .curlrc file if they exist. 5. unset_vulnerable_env_vars: Unsets vulnerable environment variables related to proxy settings. Script Execution - Usage: Save the script to a file (e.g., remediate.sh) and make it executable using chmod +x remediate.sh. - Check for curl: Execute the script with ./remediate.sh. It will verify if curl is installed. - Get curl version: If curl is installed, it retrieves the version. - Check vulnerability: Determines if the curl version is vulnerable. - Remediation: If a vulnerable version is detected, the script removes vulnerable configurations from .curlrc and unsets vulnerable environment variables. - Output: Provides feedback on the actions taken based on the detected curl version. Expected Output The script will produce an output indicating: - Whether curl is installed and its version. - Whether the curl version is vulnerable. - Actions taken for remediation, such as removing vulnerable configurations and unsetting environment variables. Example Output Detected curl version: 7.75.0 Curl version is vulnerable. Performing remediation... Vulnerable configurations removed from /home/user/.curlrc Vulnerable environment variable http_proxy unset Vulnerable environment variable HTTPS_PROXY unset Conclusion This bash script offers precise vulnerability detection and proactive remediation for insecure curl and libcurl versions on UNIX-like systems. Its streamlined functionality accurately identifies vulnerable versions, removes insecure configurations from .curlrc, and unsets vulnerable environment variables. With clear usage instructions and informative feedback, users can swiftly secure their systems against potential heap-based buffer overflow risks. Regular execution and updating to secure versions are recommended for sustained system security.
Overview This script is designed to detect and remediate a specific vulnerability in curl and libcurl versions on UNIX-like systems. The vulnerability involves a heap-based buffer overflow during the SOCKS5 proxy handshake. The script checks for vulnerable curl versions, removes potentially insecure configurations from the .curlrc file, and unsets vulnerable environment variables. Functionality 1. command_exists: This function checks if a command is available in the system's PATH. 2. get_curl_version: Retrieves the version of curl installed on the system. 3. is_vulnerable_curl_version: Determines if the detected curl version falls within a vulnerable range. 4. remove_vulnerable_config: Removes vulnerable configurations from the .curlrc file if they exist. 5. unset_vulnerable_env_vars: Unsets vulnerable environment variables related to proxy settings. Script Execution - Usage: Save the script to a file (e.g., remediate.sh) and make it executable using chmod +x remediate.sh. - Check for curl: Execute the script with ./remediate.sh. It will verify if curl is installed. - Get curl version: If curl is installed, it retrieves the version. - Check vulnerability: Determines if the curl version is vulnerable. - Remediation: If a vulnerable version is detected, the script removes vulnerable configurations from .curlrc and unsets vulnerable environment variables. - Output: Provides feedback on the actions taken based on the detected curl version. Expected Output The script will produce an output indicating: - Whether curl is installed and its version. - Whether the curl version is vulnerable. - Actions taken for remediation, such as removing vulnerable configurations and unsetting environment variables. Example Output Detected curl version: 7.75.0 Curl version is vulnerable. Performing remediation... Vulnerable configurations removed from /home/user/.curlrc Vulnerable environment variable http_proxy unset Vulnerable environment variable HTTPS_PROXY unset Conclusion This bash script offers precise vulnerability detection and proactive remediation for insecure curl and libcurl versions on UNIX-like systems. Its streamlined functionality accurately identifies vulnerable versions, removes insecure configurations from .curlrc, and unsets vulnerable environment variables. With clear usage instructions and informative feedback, users can swiftly secure their systems against potential heap-based buffer overflow risks. Regular execution and updating to secure versions are recommended for sustained system security.
Affected OS & Apps
Libcurl
by
Haxx
Oncommand Insight
by
Netapp
Oncommand Workflow Automation
by
Netapp
Libcurl
by
Haxx
Oncommand Insight
by
Netapp
Oncommand Workflow Automation
by
Netapp
Active IQ Unified Manager
by
Netapp
Windows 11 23H2
by
Microsoft
Windows 11 22H2
by
Microsoft
Windows 10 22H2
by
Microsoft
Windows 10 21H2
by
Microsoft
Windows 10 1809
by
Microsoft
Windows Server 2022
by
Microsoft
Windows Server 2019
by
Microsoft
Fedora
by
Fedoraproject
Windows 11 21H2
by
Microsoft
Show more
4.7

Patch faster and smarter
with vRx

Book a Demo
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Trusted by 600+ customers:

Solution

Patch faster and better with vRx

Patch Management

vRx automatically deploys patches across all systems, cutting patching time by 80%.

Scripting Engine

vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.

Patchless Protection

vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.
Shortlist 2024 by Captera
4.9
Customer first by Gartner
4.7
Leader spring by G2
4.9

Hear from our Customers

Consolidation & third-party patching is particularly valuable

"With vRx, we can patch in real time, especially for our end-user systems—reducing our remediation cycle from once every three months to within the week."
Michael SutherlandMichael Sutherland
Michael Sutherland
IT Security Manager

Valuable resources saved

"Before vRx, we would spend countless hours manually finding and verifying patches. We saved so much time (and headache!)."
Anonymous IT Operations LeadAnonymous IT Operations Lead
Anonymous IT Operations Lead
IT Operations Lead

Third-party software patching is the most valuable feature.

"We have automated third-party patching on specific software, improving efficiency by 80%. vRx has reduced our patching time, which has improved our operations. It is more robust than other solutions because it offers better third-party remediation."
Billy TurnerBilly Turner
Billy Turner
VP, Managed Technology & Services

Single source of truth, capable of handling any application in our fleet

"vRx gives a single pane of glass to see what patches needed to go out and what sort of vulnerabilities we have on our Windows machines. Our meantime to remediate vulnerabilities has gone down by about 60% to 70%."
Peter FallowfieldPeter Fallowfield
Peter Fallowfield
IT Manager

60% faster remediation, many hours saved

"Typically, with our previous solution of ManageEngine, it took about three hours to patch Windows Server, and now, that is less than an hour. It means less downtime for the business each month when we do patches."
Anonymous Security AnalystAnonymous Security Analyst
Anonymous Security Analyst
Security Analyst

Great patching capabilities, helpful dashboard, and excellent support

"vRx has saved us an incredible amount of time. We can just rely on the automated system and the schedules we've set. It's a huge time saver. It's saved us hundreds of hours."
Michael CortezMichael Cortez
Michael Cortez
Sr. Director of IT

My favorite feature is Patchless Protection

"With Vicarius' vRx, I've never seen a patch that failed or had to be rolled back. We're saving quite a bit of time. Our clients using vRx haven't had any issues, and they've easily established patching for all their endpoints. "
Jeremy HermanJeremy Herman
Jeremy Herman
Security Engineer

Unified vulnerability discovery, prioritization, and remediation

"Vicarius streamlines vulnerability management between IT & Security by directly linking identified vulnerabilities to required patches, enhancing efficiency. The automation process has saved at least 30 percent of our manual tasks."
Wayne AjimineWayne Ajimine
Wayne Ajimine
Information Security Professional

Patchless Protection is an incredible technology!

"vRx reduces the time customers spend on patching by reducing the overhead on the administrators, allowing them to do additional work. It saves time they would spend addressing the patching process, follow-ups, etc."
Antwune GrayAntwune Gray
Antwune Gray
VP IT Security and Services

Merge Security & IT to Remediate Threats

“Vicarius’s vRx enabled Adama to centralize and consolidate work between IT and security teams, leading to a more efficient patching workflow."
Oshri CohenOshri Cohen
Oshri Cohen
CISO
4.7

Automated Patching, Scripting, and more

Talk with our team to get a personal walkthrough
Book a Demo
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.