Patch
CVE-2023-38545
with vRx
Vulnerability Overview
CVE Name
CVE-2023-38545
Severity
9.8
Critical
CVE Description
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. When curl is asked to pass along the host name to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that host...
Show more
Show less
Latest Patch info
Patch Name
https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/
Date
16.11.2023
Script
.png)
Script Type
Remediation script
Overview
This script is designed to detect and remediate a specific vulnerability in curl and libcurl versions on UNIX-like systems. The vulnerability involves a heap-based buffer overflow during the SOCKS5 proxy handshake. The script checks for vulnerable curl versions, removes potentially insecure configurations from the .curlrc file, and unsets vulnerable environment variables.
Functionality
1. command_exists: This function checks if a command is available in the system's PATH.
2. get_curl_version: Retrieves the version of curl installed on the system.
3. is_vulnerable_curl_version: Determines if the detected curl version falls within a vulnerable range.
4. remove_vulnerable_config: Removes vulnerable configurations from the .curlrc file if they exist.
5. unset_vulnerable_env_vars: Unsets vulnerable environment variables related to proxy settings.
Script Execution
- Usage: Save the script to a file (e.g., remediate.sh) and make it executable using chmod +x remediate.sh.
- Check for curl: Execute the script with ./remediate.sh. It will verify if curl is installed.
- Get curl version: If curl is installed, it retrieves the version.
- Check vulnerability: Determines if the curl version is vulnerable.
- Remediation: If a vulnerable version is detected, the script removes vulnerable configurations from .curlrc and unsets vulnerable environment variables.
- Output: Provides feedback on the actions taken based on the detected curl version.
Expected Output
The script will produce an output indicating:
- Whether curl is installed and its version.
- Whether the curl version is vulnerable.
- Actions taken for remediation, such as removing vulnerable configurations and unsetting environment variables.
Example Output
Detected curl version: 7.75.0
Curl version is vulnerable. Performing remediation...
Vulnerable configurations removed from /home/user/.curlrc
Vulnerable environment variable http_proxy unset
Vulnerable environment variable HTTPS_PROXY unset
Conclusion
This bash script offers precise vulnerability detection and proactive remediation for insecure curl and libcurl versions on UNIX-like systems. Its streamlined functionality accurately identifies vulnerable versions, removes insecure configurations from .curlrc, and unsets vulnerable environment variables. With clear usage instructions and informative feedback, users can swiftly secure their systems against potential heap-based buffer overflow risks. Regular execution and updating to secure versions are recommended for sustained system security.
Read more
Read less
Affected OS & Apps
Libcurl
by
Haxx
Oncommand Insight
by
Netapp
Oncommand Workflow Automation
by
Netapp
Show more
Patch faster and smarter
with vRx
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Trusted by 600+ customers:




Solution
Patch faster and better with vRx
Patch Management
vRx automatically deploys patches across all systems, cutting patching time by 80%.
Scripting Engine
vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.
Patchless Protection
vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.

Automated Patching, Scripting, and more
Talk with our team to get a personal walkthrough
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.