Curl 7.69 < 8.4.0 Heap Buffer Overflow and Curl 7.84 <= 8.2.1 Header DoS (CVE-2023-38039) Attack How to fix

Sathishkumar Singh 486 Reputation points
2023-10-30T05:59:34.27+00:00

Hello Team

Nessus has reported vulnerability. Curl 7.69 < 8.4.0 Heap Buffer Overflow and Curl 7.84 <= 8.2.1 Header DoS (CVE-2023-38039) for 2016,2019,2022

Please let me know how to fix this issue ASAP

Windows for business Windows Server User experience Other
{count} votes

1 answer

Sort by: Most helpful
  1. Wisley Jean 0 Reputation points
    2023-11-18T17:44:21.0466667+00:00

    Hello everyone there is a way to update this vulnerability I was able to do it successfully on Windows server 2019.

    Step 1: Go to https://www.msys2.org/ and download the installer. Also Git will need to be installed as well https://git-scm.com/downloads

    Step 2: After downloading MSYS2, open the application. Copy the following commands in order. If you're doing it from the command prompt , use "set" instead of "export".

    • pacman -S --needed git base-devel mingw-w64-x86_64-toolchain
    • source shell mingw64
    • git clone https://github.com/microsoft/vcpkg.git
    • cd vcpkg
    • ./bootstrap-vcpkg.bat
    • export VCPKG_DEFAULT_TRIPLET=x64-mingw-dynamic
    • export VCPKG_DEFAULT_HOST_TRIPLET=x64-mingw-dynamic
    • ./vcpkg install curl

    You should now have the latest curl 8.4.0! :)

    User's image

    References: https://learn.microsoft.com/en-us/vcpkg/users/platforms/mingw

    https://github.com/microsoft/vcpkg#quick-start-windows

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.