|
| 1 | +{ |
| 2 | + "task_id": "sec-cve-001", |
| 3 | + "description": "curl SOCKS5 heap buffer overflow CVE-2023-38545 triage", |
| 4 | + "weights": { |
| 5 | + "required_findings": 0.40, |
| 6 | + "file_references": 0.30, |
| 7 | + "causal_chain": 0.20, |
| 8 | + "negative_checks": 0.10 |
| 9 | + }, |
| 10 | + "required_findings": [ |
| 11 | + { |
| 12 | + "id": "f1", |
| 13 | + "description": "Identifies the vulnerable function do_SOCKS5 or Curl_SOCKS5", |
| 14 | + "patterns": ["do_SOCKS5", "Curl_SOCKS5"], |
| 15 | + "weight": 0.25 |
| 16 | + }, |
| 17 | + { |
| 18 | + "id": "f2", |
| 19 | + "description": "Identifies heap buffer overflow vulnerability type", |
| 20 | + "patterns": ["heap.*buffer.*overflow", "buffer.*overflow.*heap", "heap.*overflow"], |
| 21 | + "weight": 0.20 |
| 22 | + }, |
| 23 | + { |
| 24 | + "id": "f3", |
| 25 | + "description": "Identifies the hostname length check (255 byte limit)", |
| 26 | + "patterns": ["255", "hostname.*len", "hostname_len"], |
| 27 | + "weight": 0.20 |
| 28 | + }, |
| 29 | + { |
| 30 | + "id": "f4", |
| 31 | + "description": "Identifies the socks5_resolve_local variable or state machine issue", |
| 32 | + "patterns": ["socks5_resolve_local", "resolve.*local", "state.*machine", "non.?blocking"], |
| 33 | + "weight": 0.20 |
| 34 | + }, |
| 35 | + { |
| 36 | + "id": "f5", |
| 37 | + "description": "Identifies SOCKS5 proxy handshake as the attack surface", |
| 38 | + "patterns": ["SOCKS5.*proxy|proxy.*SOCKS5", "SOCKS5.*handshake|handshake.*SOCKS5", "CURLPROXY_SOCKS5"], |
| 39 | + "weight": 0.15 |
| 40 | + } |
| 41 | + ], |
| 42 | + "file_references": [ |
| 43 | + { |
| 44 | + "id": "r1", |
| 45 | + "description": "Identifies lib/socks.c as the vulnerable file", |
| 46 | + "patterns": ["lib/socks\\.c", "socks\\.c"], |
| 47 | + "weight": 0.50 |
| 48 | + }, |
| 49 | + { |
| 50 | + "id": "r2", |
| 51 | + "description": "Identifies lib/socks.h or SOCKS-related headers", |
| 52 | + "patterns": ["lib/socks\\.h", "socks\\.h", "lib/cf-socket"], |
| 53 | + "weight": 0.20 |
| 54 | + }, |
| 55 | + { |
| 56 | + "id": "r3", |
| 57 | + "description": "Identifies CONNECT_SOCKS_INIT or CONNECT_RESOLVE_REMOTE state", |
| 58 | + "patterns": ["CONNECT_SOCKS_INIT", "CONNECT_RESOLVE_REMOTE", "CONNECT_REQ_SEND"], |
| 59 | + "weight": 0.30 |
| 60 | + } |
| 61 | + ], |
| 62 | + "causal_chain": [ |
| 63 | + { |
| 64 | + "id": "c1", |
| 65 | + "description": "Explains hostname > 255 bytes should trigger local resolve but state machine loses this decision", |
| 66 | + "patterns": ["hostname.*255|255.*hostname", "resolve.*local|local.*resolve", "state|re.?enter"], |
| 67 | + "ordered": true, |
| 68 | + "weight": 0.50 |
| 69 | + }, |
| 70 | + { |
| 71 | + "id": "c2", |
| 72 | + "description": "Explains that the oversized hostname gets copied into a fixed-size heap buffer", |
| 73 | + "patterns": ["hostname.*cop|cop.*hostname|memcpy|socksreq", "buffer|overflow|heap"], |
| 74 | + "ordered": true, |
| 75 | + "weight": 0.50 |
| 76 | + } |
| 77 | + ], |
| 78 | + "negative_checks": [ |
| 79 | + { |
| 80 | + "id": "n1", |
| 81 | + "description": "Does NOT blame TLS/SSL layer for the vulnerability", |
| 82 | + "patterns": ["TLS.*cause|TLS.*root|SSL.*cause|SSL.*root|TLS.*vulnerab|SSL.*vulnerab"], |
| 83 | + "must_be_absent": true, |
| 84 | + "weight": 0.50 |
| 85 | + }, |
| 86 | + { |
| 87 | + "id": "n2", |
| 88 | + "description": "Does NOT blame HTTP parsing as the root cause", |
| 89 | + "patterns": ["HTTP.*pars.*root|HTTP.*pars.*cause|HTTP.*pars.*vulnerab"], |
| 90 | + "must_be_absent": true, |
| 91 | + "weight": 0.50 |
| 92 | + } |
| 93 | + ] |
| 94 | +} |
0 commit comments