{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-38039","assignerOrgId":"36234546-b8fa-4601-9d6f-f4e334aa8ea1","state":"PUBLISHED","assignerShortName":"hackerone","dateReserved":"2023-07-12T01:00:11.881Z","datePublished":"2023-09-15T03:21:54.348Z","dateUpdated":"2025-12-02T20:06:21.809Z"},"containers":{"cna":{"descriptions":[{"lang":"en","value":"When curl retrieves an HTTP response, it stores the incoming headers so that\nthey can be accessed later via the libcurl headers API.\n\nHowever, curl did not have a limit in how many or how large headers it would\naccept in a response, allowing a malicious server to stream an endless series\nof headers and eventually cause curl to run out of heap memory."}],"affected":[{"vendor":"curl","product":"curl","versions":[{"version":"8.3.0","status":"affected","lessThan":"8.3.0","versionType":"semver"},{"version":"7.84.0","status":"unaffected","lessThan":"7.84.0","versionType":"semver"}]}],"references":[{"url":"https://hackerone.com/reports/2072338"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/"},{"url":"https://security.gentoo.org/glsa/202310-12"},{"url":"https://security.netapp.com/advisory/ntap-20231013-0005/"},{"url":"http://seclists.org/fulldisclosure/2023/Oct/17"},{"url":"https://support.apple.com/kb/HT214036"},{"url":"https://www.insyde.com/security-pledge/SA-2023064"},{"url":"https://support.apple.com/kb/HT214063"},{"url":"https://support.apple.com/kb/HT214057"},{"url":"https://support.apple.com/kb/HT214058"},{"url":"http://seclists.org/fulldisclosure/2024/Jan/34"},{"url":"http://seclists.org/fulldisclosure/2024/Jan/37"},{"url":"http://seclists.org/fulldisclosure/2024/Jan/38"}],"providerMetadata":{"orgId":"36234546-b8fa-4601-9d6f-f4e334aa8ea1","shortName":"hackerone","dateUpdated":"2024-01-26T17:07:31.459Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T17:30:12.356Z"},"title":"CVE Program Container","references":[{"url":"https://hackerone.com/reports/2072338","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/","tags":["x_transferred"]},{"url":"https://security.gentoo.org/glsa/202310-12","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20231013-0005/","tags":["x_transferred"]},{"url":"http://seclists.org/fulldisclosure/2023/Oct/17","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT214036","tags":["x_transferred"]},{"url":"https://www.insyde.com/security-pledge/SA-2023064","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT214063","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT214057","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT214058","tags":["x_transferred"]},{"url":"http://seclists.org/fulldisclosure/2024/Jan/34","tags":["x_transferred"]},{"url":"http://seclists.org/fulldisclosure/2024/Jan/37","tags":["x_transferred"]},{"url":"http://seclists.org/fulldisclosure/2024/Jan/38","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-770","lang":"en","description":"CWE-770 Allocation of Resources Without Limits or Throttling"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.5,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-06-03T19:17:43.934414Z","id":"CVE-2023-38039","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-02T20:06:21.809Z"}}]}}