A critical vulnerability in cURL provides attackers with the ability to set up a host system that foists an overlong host name on clients when connecting to SOCKS5 proxies.
This results in a buffer overflow that allows remote code execution on the client system.
All cURL versions between 7.69.0 and including 8.3.0 are affected. cURL for Windows and cURL for Python are not affected. Fortunately, there is another limitation. The vulnerability can only be exploited if the SOCKS5 connection is via a proxy.
| Date | 2025-10-06 |
| Type d’information | Notifications |
| Catégorie d’information | Product Security, Phase de débogage |