
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-35260 is a vulnerability in curl's .netrc file parser discovered in October 2022. The vulnerability affects curl versions 7.84.0 to 7.85.0, where if a .netrc file ends in a line with consecutive non-white space letters and no newline, curl could read past the end of the stack-based buffer and write a zero byte beyond its boundary (Curl Advisory).
The vulnerability is classified as a Stack-based Buffer Overflow (CWE-121) with a CVSS score of 6.5 (Medium). The issue occurs when parsing a .netrc file that ends with 4095 consecutive non-white space letters without a newline character. In this scenario, curl would first read past the end of the stack-based buffer and potentially write a zero byte beyond its boundary (Curl Advisory, MITRE CVE).
The vulnerability primarily results in a segmentation fault or similar crash conditions. If a malicious user can provide a custom netrc file to an application or otherwise affect its contents, this flaw could be exploited as a denial-of-service attack (Curl Advisory).
There are several recommended mitigations: 1) Upgrade curl to version 7.86.0 or later, 2) Apply the patch to the local version, or 3) Avoid using .netrc files. The fix was implemented through a commit that addressed the buffer overflow issue (Curl Advisory).
The vulnerability has been acknowledged and patched by various major technology companies. Apple included fixes for this vulnerability in their macOS Ventura 13.2 and Monterey 12.6.3 updates (Apple Support, Apple Support). NetApp also addressed this vulnerability in multiple products through their security advisory (NetApp Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."