CVE-2023-23916
MySQL vulnerability analysis and mitigation

Overview

CVE-2023-23916 is a vulnerability discovered in curl versions 7.57.0 through 7.87.0, disclosed on February 15, 2023. The vulnerability relates to curl's support for 'chained' HTTP compression algorithms, where a malicious server could insert an unlimited number of compression steps through multiple headers. This flaw is classified as an allocation of resources without limits or throttling vulnerability (Curl Advisory).

Technical details

The vulnerability stems from curl's implementation of HTTP compression algorithm chaining. While the number of acceptable 'links' in the decompression chain was capped, this cap was implemented on a per-header basis. This allowed malicious servers to bypass the limitation by using multiple headers. The vulnerability affects both Content-Encoding and Transfer-Encoding headers across all HTTP versions. The issue is particularly concerning as it can be triggered with default options due to how Transfer-Encoding works in curl. This vulnerability is categorized as CWE-770: Allocation of Resources Without Limits or Throttling, with a CVSS score of 6.5 (Medium) (Curl Advisory, NVD).

Impact

When successfully exploited, this vulnerability could result in a 'malloc bomb', causing curl to consume enormous amounts of allocated heap memory or attempt to do so and return out-of-memory errors. This could effectively lead to a denial of service condition. The vulnerability affects both the curl command-line tool and libcurl library implementations (Curl Advisory).

Mitigation and workarounds

The vulnerability was fixed in curl version 7.88.0, released on February 15, 2023. The fix implements a total cap of 5 on the number of accepted 'chained' algorithms, regardless of the number of headers. Users are strongly recommended to upgrade to version 7.88.0 or later. For those unable to upgrade immediately, there are no known workarounds (Curl Advisory).

Additional resources


SourceThis report was generated using AI

Related MySQL vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-53054MEDIUM5.5
  • MySQLMySQL
  • mysql:8.0::mysql-devel
NoYesOct 21, 2025
CVE-2025-53053MEDIUM5.5
  • MySQLMySQL
  • mysql:8.0::mysql-server
NoYesOct 21, 2025
CVE-2025-53069MEDIUM4.9
  • MySQLMySQL
  • mysql8.4-libs
NoYesOct 21, 2025
CVE-2025-53067MEDIUM4.9
  • MySQLMySQL
  • cpe:2.3:a:oracle:mysql_server
NoYesOct 21, 2025
CVE-2025-53062MEDIUM4.9
  • MySQLMySQL
  • mysql:8.4::mysql-errmsg
NoYesOct 21, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management