<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: High Severity cURL and libcurl CVE-2023-38545 in Open Q&amp;A</title>
    <link>https://community.dynatrace.com/t5/Open-Q-A/High-Severity-cURL-and-libcurl-CVE-2023-38545/m-p/225107#M28928</link>
    <description>&lt;P&gt;IMHO, one more risk exaggeration, this time from the curl maintainer. For what I read of the vulnerability:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;curl has to be using a SOCKS5 proxy&lt;/LI&gt;&lt;LI&gt;an attacker has to be able to point curl to a specific server they control&lt;/LI&gt;&lt;LI&gt;curl is nor vulnerable in its default state, with the typical CURLOPT_BUFFERSIZE value&lt;/LI&gt;&lt;LI&gt;latency &amp;amp; time replies are also involved&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;If you have like a public page that uses underlying curl , have changed the CURLOPT_BUFFERSIZE, have a SOCKS5 proxy (do you????), and it is slow, you might have a problem though!&lt;/P&gt;</description>
    <pubDate>Wed, 11 Oct 2023 15:26:30 GMT</pubDate>
    <dc:creator>AntonioSousa</dc:creator>
    <dc:date>2023-10-11T15:26:30Z</dc:date>
    <item>
      <title>High Severity cURL and libcurl CVE-2023-38545</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/High-Severity-cURL-and-libcurl-CVE-2023-38545/m-p/224984#M28881</link>
      <description>&lt;P&gt;High Severity for&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Curl en Libcurl CVE-2023-38545&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;has been brought to our attention.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Tomorrow news will come out about a high severity vulnerability for cURL and libcur. The advice is to conduct an analysis of where this vulnerability occurs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.rezilion.com/blog/cve-2023-38545-a-high-severity-curl-and-libcurl-cve-to-be-published-on-october-11th/" target="_blank" rel="noopener"&gt;https://www.rezilion.com/blog/cve-2023-38545-a-high-severity-curl-and-libcurl-cve-to-be-published-on-october-11th/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;This has not been posted yet at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://cve-status.dynatrace.com/" target="_blank" rel="noopener noreferrer"&gt;cve-status.dynatrace.com&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.dynatrace.com/t5/Heads-up-from-Dynatrace/Dynatrace-CVE-status-Common-Vulnerabilities-and-Exposures/ta-p/214793" target="_blank" rel="noopener noreferrer"&gt;Dynatrace CVE status (Common Vulnerabilities and Exposures) - Dynatrace Community&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;I have opened a Support ticket, as indicated on this page.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2023 14:11:25 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/High-Severity-cURL-and-libcurl-CVE-2023-38545/m-p/224984#M28881</guid>
      <dc:creator>fstekelenburg</dc:creator>
      <dc:date>2023-10-10T14:11:25Z</dc:date>
    </item>
    <item>
      <title>Re: High Severity for Curl en Libcurl CVE-2023-38545</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/High-Severity-cURL-and-libcurl-CVE-2023-38545/m-p/224987#M28882</link>
      <description>&lt;P&gt;I have been following this and it seems that it is going to be at least a local execution exploit. You would probably have to be accessing a nasty site, so you then get exploited locally. Let's see what exactly what it is.&lt;/P&gt;&lt;P&gt;In the meantime, it's important to know if you have curl executing somewhere in your stack. Some of the curl executions might make it to the respective PG as below, but given that it normally executes for only a slight period of time, it might nor be automatically detetected by Dynatrace.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AntonioSousa_0-1696945979382.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/14520i983FBA4EECA3A2E1/image-size/large?v=v2&amp;amp;px=999" role="button" title="AntonioSousa_0-1696945979382.png" alt="AntonioSousa_0-1696945979382.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2023 13:54:31 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/High-Severity-cURL-and-libcurl-CVE-2023-38545/m-p/224987#M28882</guid>
      <dc:creator>AntonioSousa</dc:creator>
      <dc:date>2023-10-10T13:54:31Z</dc:date>
    </item>
    <item>
      <title>Re: High Severity for Curl en Libcurl CVE-2023-38545</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/High-Severity-cURL-and-libcurl-CVE-2023-38545/m-p/224990#M28884</link>
      <description>&lt;P&gt;Thanks for the added info&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/17213"&gt;@AntonioSousa&lt;/a&gt;.&lt;BR /&gt;&lt;BR /&gt;Curl can be found on all Linux boxes where also OneAgents, ActiveGates and Managed Cluster nodes are installed, and regularly utilized as tool in the life of an admin. And of course the Dynatrace admins are very trustworthy people, and will never use dodgy sites, But somehow the Security people are hard to convince &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; So I expect that they are persistent in havin the packages updated. I do not think that curl itself is a package that is part of Dynatrace and installed as such, in which case is will be a Linux admin matter.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2023 14:27:59 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/High-Severity-cURL-and-libcurl-CVE-2023-38545/m-p/224990#M28884</guid>
      <dc:creator>fstekelenburg</dc:creator>
      <dc:date>2023-10-10T14:27:59Z</dc:date>
    </item>
    <item>
      <title>Re: High Severity for Curl en Libcurl CVE-2023-38545</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/High-Severity-cURL-and-libcurl-CVE-2023-38545/m-p/225006#M28886</link>
      <description>&lt;P&gt;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/21639"&gt;@fstekelenburg&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I have checked if OneAgent &amp;amp; ActiveGate in some form use libcurl, but it doesn't seem to be the case. But eventually, some users might have scripts using curl (I have) that access Dynatrace (and other) API endpoints. I don't expect that to be a risk issue when we know about the vulnerability tomorrow, so let's wait&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2023 17:45:11 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/High-Severity-cURL-and-libcurl-CVE-2023-38545/m-p/225006#M28886</guid>
      <dc:creator>AntonioSousa</dc:creator>
      <dc:date>2023-10-10T17:45:11Z</dc:date>
    </item>
    <item>
      <title>Re: High Severity cURL and libcurl CVE-2023-38545</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/High-Severity-cURL-and-libcurl-CVE-2023-38545/m-p/225081#M28922</link>
      <description>&lt;P&gt;Hi all, thank you for your patience. You can find our official response &lt;A href="https://www.dynatrace.com/news/security-alert/curl-socks5-heap-buffer-overflow-cve-2023-38545/" target="_self"&gt;here&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2023 11:57:44 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/High-Severity-cURL-and-libcurl-CVE-2023-38545/m-p/225081#M28922</guid>
      <dc:creator>HannahM</dc:creator>
      <dc:date>2023-10-11T11:57:44Z</dc:date>
    </item>
    <item>
      <title>Re: High Severity cURL and libcurl CVE-2023-38545</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/High-Severity-cURL-and-libcurl-CVE-2023-38545/m-p/225107#M28928</link>
      <description>&lt;P&gt;IMHO, one more risk exaggeration, this time from the curl maintainer. For what I read of the vulnerability:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;curl has to be using a SOCKS5 proxy&lt;/LI&gt;&lt;LI&gt;an attacker has to be able to point curl to a specific server they control&lt;/LI&gt;&lt;LI&gt;curl is nor vulnerable in its default state, with the typical CURLOPT_BUFFERSIZE value&lt;/LI&gt;&lt;LI&gt;latency &amp;amp; time replies are also involved&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;If you have like a public page that uses underlying curl , have changed the CURLOPT_BUFFERSIZE, have a SOCKS5 proxy (do you????), and it is slow, you might have a problem though!&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2023 15:26:30 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/High-Severity-cURL-and-libcurl-CVE-2023-38545/m-p/225107#M28928</guid>
      <dc:creator>AntonioSousa</dc:creator>
      <dc:date>2023-10-11T15:26:30Z</dc:date>
    </item>
  </channel>
</rss>

