Skip to main content

CVE-2022-32206: Allocation of Resources Without Limits or Throttling (CWE-770) in https://github.com/curl/curl

Medium
VulnerabilityCVE-2022-32206cvecve-2022-32206cwe-770
Published: Thu Jul 07 2022 (07/07/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: https://github.com/curl/curl

Description

curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.

AI-Powered Analysis

AILast updated: 07/06/2025, 23:57:41 UTC

Technical Analysis

CVE-2022-32206 is a vulnerability identified in the curl library versions prior to 7.84.0, related to the handling of HTTP response compression. Curl supports "chained" HTTP compression algorithms, where a server response can be compressed multiple times using different algorithms in sequence. The vulnerability arises because the number of compression layers (or "links" in the decompression chain) was unbounded, allowing a malicious server to craft a response with an excessively long chain of compressed data. When curl attempts to decompress such a response, it can lead to a "malloc bomb" scenario, where the library allocates an enormous amount of heap memory to handle the decompression steps. This can cause curl to consume excessive memory resources, potentially leading to out-of-memory errors or crashes. The vulnerability is classified under CWE-770 (Allocation of Resources Without Limits or Throttling), indicating that the software does not impose limits on resource consumption, which can be exploited to cause denial of service (DoS). The CVSS v3.1 score is 6.5 (medium severity), with the vector indicating that the attack can be performed remotely without privileges (AV:N/AC:L/PR:N), requires user interaction (UI:R), and impacts availability (A:H) but not confidentiality or integrity. No known exploits are reported in the wild. The issue was fixed in curl version 7.84.0 by introducing limits on the decompression chain length to prevent excessive resource allocation.

Potential Impact

For European organizations, this vulnerability poses a risk primarily of denial of service. Applications and services that rely on curl for HTTP communications and that process responses from potentially untrusted or external servers could be targeted by attackers who craft malicious HTTP responses with deeply nested compression chains. This can cause the affected curl client to consume excessive memory, leading to application crashes or degraded performance. Such disruptions can impact web clients, automated scripts, CI/CD pipelines, or any system component using vulnerable curl versions. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can affect business operations, especially for organizations with high dependency on automated data retrieval or API integrations. The risk is heightened in environments where user interaction triggers curl requests to external servers, such as browsers or client applications fetching remote content. Since no authentication or privileges are required for exploitation, and the attack vector is network-based, the threat can be exploited remotely. European organizations should be aware that this vulnerability could be leveraged in targeted DoS attacks or as part of multi-stage attacks aiming to disrupt services.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should ensure that all instances of curl are updated to version 7.84.0 or later, where the decompression chain length is properly limited. For environments where immediate patching is not feasible, consider implementing network-level controls such as web application firewalls (WAFs) or intrusion prevention systems (IPS) that can detect and block suspicious HTTP responses with abnormal compression headers or unusually large payloads. Application developers should audit their use of curl to confirm that it is not exposed to untrusted servers without validation. Additionally, monitoring memory usage and application logs for signs of abnormal resource consumption related to HTTP decompression can provide early detection of exploitation attempts. Organizations should also review and restrict user interactions that trigger curl requests to untrusted endpoints. Finally, incorporating security testing that simulates malicious compression chains can help validate the robustness of curl usage in internal applications.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2022-06-01T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc250

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/6/2025, 11:57:41 PM

Last updated: 7/30/2025, 10:07:39 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats