Impact of AutoSys/WCC/EEM with CVE-2024-7264 libcurl security vulnerability
CVE-2024-7264 Detail
excerpt from the NVD below
"libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect field, the parser might end up using -1 for the length of the *time fraction*, leading to a `strlen()` getting performed on a pointer to a heap buffer area that is not (purposely) null terminated. This flaw most likely leads to a crash, but can also lead to heap contents getting returned to the application when [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used."
AutoSys/WCC:
AutoSys Sustaining Engineering team has confirmed this vulnerability has no impact from AutoSys shipped library named libascurl.so/.dll because libascurl.so/.dll does not make use of CURLINFO_CERTINFO call as described in the vulnerability description.
EEM:
EEM Sustaining Engineering team has confirmed that the product does not make use of the functionality that parses the certificate using CURLINFO_CERTINFO. Therefore, EEM is also not impacted by this CVE.