| Publication Date: |
|
| Last Update: |
|
| Current Version: | V1.0 |
| CVSS v3.1 Base Score: | 8.8 |
| Known Not Affected Products | Reason |
|---|---|
|
All versions not affected by CVE-2023-38545 |
The product does not contain affected WIBU CodeMeter Runtime component (Component Not Present)
|
|
All versions not affected by CVE-2023-38545 |
The product does not contain affected WIBU CodeMeter Runtime component (Component Not Present)
|
Product-specific remediations or mitigations can be found in the section
Known Affected Products.
Please follow the General Security Recommendations.
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
This chapter describes all vulnerabilities (CVE-IDs) addressed in this security advisory. Wherever applicable, it also documents the product-specific impact of the individual vulnerabilities.
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake.
When curl is asked to pass along the hostname to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that hostname can be is 255 bytes.
If the hostname is detected to be longer than 255 bytes, curl switches to local name resolving and instead passes on the resolved address only to the proxy. Due to a bug, the local variable that means "let the host resolve the name" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long hostname to the target buffer instead of copying just the resolved address there.
| CVSS v3.1 Base Score | 8.8 |
| CVSS v3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
| CWE | CWE-122: Heap-based Buffer Overflow |
Please follow below steps to update the WIBU CodeMeter : - Uninstall the previous installed version of CodeMeter via Control Panel - Install WIBU Codemeter User Runtime V8.40b or later version (Download from: https://www.wibu.com/us/support/user/downloads-user-software.html) - Restart client/server after installation of CodeMeter For more details regarding the vulnerability in CodeMeter Runtime refer to: * WIBU Systems Security Advisory WIBU-231017-01: https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/AdvisoryWIBU-231017-01.pdf
| V1.0 (2026-02-10): | Publication Date |