CVE-2022-32206: Allocation of Resources Without Limits or Throttling (CWE-770) in https://github.com/curl/curl
curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.
AI Analysis
Technical Summary
CVE-2022-32206 is a vulnerability identified in the curl library versions prior to 7.84.0, related to the handling of HTTP response compression. Curl supports "chained" HTTP compression algorithms, where a server response can be compressed multiple times using different algorithms in sequence. The vulnerability arises because the number of compression layers (or "links" in the decompression chain) was unbounded, allowing a malicious server to craft a response with an excessively long chain of compressed data. When curl attempts to decompress such a response, it can lead to a "malloc bomb" scenario, where the library allocates an enormous amount of heap memory to handle the decompression steps. This can cause curl to consume excessive memory resources, potentially leading to out-of-memory errors or crashes. The vulnerability is classified under CWE-770 (Allocation of Resources Without Limits or Throttling), indicating that the software does not impose limits on resource consumption, which can be exploited to cause denial of service (DoS). The CVSS v3.1 score is 6.5 (medium severity), with the vector indicating that the attack can be performed remotely without privileges (AV:N/AC:L/PR:N), requires user interaction (UI:R), and impacts availability (A:H) but not confidentiality or integrity. No known exploits are reported in the wild. The issue was fixed in curl version 7.84.0 by introducing limits on the decompression chain length to prevent excessive resource allocation.
Potential Impact
For European organizations, this vulnerability poses a risk primarily of denial of service. Applications and services that rely on curl for HTTP communications and that process responses from potentially untrusted or external servers could be targeted by attackers who craft malicious HTTP responses with deeply nested compression chains. This can cause the affected curl client to consume excessive memory, leading to application crashes or degraded performance. Such disruptions can impact web clients, automated scripts, CI/CD pipelines, or any system component using vulnerable curl versions. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can affect business operations, especially for organizations with high dependency on automated data retrieval or API integrations. The risk is heightened in environments where user interaction triggers curl requests to external servers, such as browsers or client applications fetching remote content. Since no authentication or privileges are required for exploitation, and the attack vector is network-based, the threat can be exploited remotely. European organizations should be aware that this vulnerability could be leveraged in targeted DoS attacks or as part of multi-stage attacks aiming to disrupt services.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should ensure that all instances of curl are updated to version 7.84.0 or later, where the decompression chain length is properly limited. For environments where immediate patching is not feasible, consider implementing network-level controls such as web application firewalls (WAFs) or intrusion prevention systems (IPS) that can detect and block suspicious HTTP responses with abnormal compression headers or unusually large payloads. Application developers should audit their use of curl to confirm that it is not exposed to untrusted servers without validation. Additionally, monitoring memory usage and application logs for signs of abnormal resource consumption related to HTTP decompression can provide early detection of exploitation attempts. Organizations should also review and restrict user interactions that trigger curl requests to untrusted endpoints. Finally, incorporating security testing that simulates malicious compression chains can help validate the robustness of curl usage in internal applications.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2022-32206: Allocation of Resources Without Limits or Throttling (CWE-770) in https://github.com/curl/curl
Description
curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.
AI-Powered Analysis
Technical Analysis
CVE-2022-32206 is a vulnerability identified in the curl library versions prior to 7.84.0, related to the handling of HTTP response compression. Curl supports "chained" HTTP compression algorithms, where a server response can be compressed multiple times using different algorithms in sequence. The vulnerability arises because the number of compression layers (or "links" in the decompression chain) was unbounded, allowing a malicious server to craft a response with an excessively long chain of compressed data. When curl attempts to decompress such a response, it can lead to a "malloc bomb" scenario, where the library allocates an enormous amount of heap memory to handle the decompression steps. This can cause curl to consume excessive memory resources, potentially leading to out-of-memory errors or crashes. The vulnerability is classified under CWE-770 (Allocation of Resources Without Limits or Throttling), indicating that the software does not impose limits on resource consumption, which can be exploited to cause denial of service (DoS). The CVSS v3.1 score is 6.5 (medium severity), with the vector indicating that the attack can be performed remotely without privileges (AV:N/AC:L/PR:N), requires user interaction (UI:R), and impacts availability (A:H) but not confidentiality or integrity. No known exploits are reported in the wild. The issue was fixed in curl version 7.84.0 by introducing limits on the decompression chain length to prevent excessive resource allocation.
Potential Impact
For European organizations, this vulnerability poses a risk primarily of denial of service. Applications and services that rely on curl for HTTP communications and that process responses from potentially untrusted or external servers could be targeted by attackers who craft malicious HTTP responses with deeply nested compression chains. This can cause the affected curl client to consume excessive memory, leading to application crashes or degraded performance. Such disruptions can impact web clients, automated scripts, CI/CD pipelines, or any system component using vulnerable curl versions. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can affect business operations, especially for organizations with high dependency on automated data retrieval or API integrations. The risk is heightened in environments where user interaction triggers curl requests to external servers, such as browsers or client applications fetching remote content. Since no authentication or privileges are required for exploitation, and the attack vector is network-based, the threat can be exploited remotely. European organizations should be aware that this vulnerability could be leveraged in targeted DoS attacks or as part of multi-stage attacks aiming to disrupt services.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should ensure that all instances of curl are updated to version 7.84.0 or later, where the decompression chain length is properly limited. For environments where immediate patching is not feasible, consider implementing network-level controls such as web application firewalls (WAFs) or intrusion prevention systems (IPS) that can detect and block suspicious HTTP responses with abnormal compression headers or unusually large payloads. Application developers should audit their use of curl to confirm that it is not exposed to untrusted servers without validation. Additionally, monitoring memory usage and application logs for signs of abnormal resource consumption related to HTTP decompression can provide early detection of exploitation attempts. Organizations should also review and restrict user interactions that trigger curl requests to untrusted endpoints. Finally, incorporating security testing that simulates malicious compression chains can help validate the robustness of curl usage in internal applications.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- hackerone
- Date Reserved
- 2022-06-01T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdc250
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/6/2025, 11:57:41 PM
Last updated: 2/7/2026, 7:57:09 AM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2077: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.