[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250053

 
 

909

 
 

195940

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2ECS-2023-016 --- ecs-service-connect-agent

ID: oval:org.secpod.oval:def:1701896Date: (C)2023-11-24   (M)2024-04-29
Class: PATCHFamily: unix




An issue was found in libcurl which allows cookies to be inserted into a running program if specific conditions are met. The libcurl provided function, curl_easy_duphandle, is used to duplicate the easy_handle associated with a transfer. If a duplicated transfer's easy_handle has cookies enabled when it is duplicated, the cookie-enabled state is cloned but the actual cookies are not. If the source easy_handle didn't read cookies from disk, the cloned easy_handle will attempt to read cookies from a file named 'none' in the local directory, potentially allowing arbitrary cookies to be loaded. Line directives can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex. The HTTP/2 protocol allows a denial of service because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023

Platform:
Amazon Linux 2
Product:
ecs-service-connect-agent
Reference:
ALAS2ECS-2023-016
CVE-2023-38546
CVE-2023-39323
CVE-2023-44487
CVE    3
CVE-2023-39323
CVE-2023-38546
CVE-2023-44487
CPE    1
cpe:/o:amazon:linux:2

© SecPod Technologies