CVE-2024-7264 libcurl security vulnerability
search cancel

CVE-2024-7264 libcurl security vulnerability

book

Article ID: 388140

calendar_today

Updated On:

Products

Autosys Workload Automation

Issue/Introduction

Impact of AutoSys/WCC/EEM with CVE-2024-7264 libcurl security vulnerability

CVE-2024-7264 Detail
excerpt from the NVD below

"libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect field, the parser might end up using -1 for the length of the *time fraction*, leading to a `strlen()` getting performed on a pointer to a heap buffer area that is not (purposely) null terminated. This flaw most likely leads to a crash, but can also lead to heap contents getting returned to the application when [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used."

 

Resolution

AutoSys/WCC:
AutoSys Sustaining Engineering team has confirmed this vulnerability has no impact from AutoSys shipped library named libascurl.so/.dll because libascurl.so/.dll does not make use of CURLINFO_CERTINFO call as described in the vulnerability description.

EEM:
EEM Sustaining Engineering team has confirmed that the product does not make use of the functionality that parses the certificate using CURLINFO_CERTINFO. Therefore, EEM is also not impacted by this CVE.