Description
When curl retrieves an HTTP response, it stores the incoming headers so that
they can be accessed later via the libcurl headers API.

However, curl did not have a limit in how many or how large headers it would
accept in a response, allowing a malicious server to stream an endless series
of headers and eventually cause curl to run out of heap memory.
Published: 2023-09-15
Score: 7.5 High
EPSS: 12.3% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-6363-1 curl vulnerability
History

Tue, 02 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Fedoraproject Fedora
Haxx Curl
Microsoft Windows 10 1809 Windows 10 21h2 Windows 10 22h2 Windows 11 21h2 Windows 11 22h2 Windows 11 23h2 Windows Server 2019 Windows Server 2022
Redhat Jboss Core Services
cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2025-12-02T20:06:21.809Z

Reserved: 2023-07-12T01:00:11.881Z

Link: CVE-2023-38039

cve-icon Vulnrichment

Updated: 2024-08-02T17:30:12.356Z

cve-icon NVD

Status : Modified

Published: 2023-09-15T04:15:10.127

Modified: 2025-12-02T20:15:46.680

Link: CVE-2023-38039

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-09-13T00:00:00Z

Links: CVE-2023-38039 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses