{"id":28877,"date":"2023-02-25T00:04:16","date_gmt":"2023-02-24T23:04:16","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=28877"},"modified":"2024-10-05T19:06:37","modified_gmt":"2024-10-05T17:06:37","slug":"windows-microsoft-liefert-curl-bibliothek-weiterhin-mit-schwachstellen-aus-feb-2023","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2023\/02\/25\/windows-microsoft-liefert-curl-bibliothek-weiterhin-mit-schwachstellen-aus-feb-2023\/","title":{"rendered":"Windows 10\/11: Microsoft still ships old version of cURL lib with vulnerabilities (Feb. 2023)"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/?p=278250\" target=\"_blank\" rel=\"noopener\">German<\/a>]It's a messy story that I'm posting here on the blog again. Microsoft fails to ship cURL with Windows 10\/11 in such a way that the software is up to date and no longer has known vulnerabilities. I had already raised the issue on the blog in January 2022 &#8211; but nothing has changed, as I could see by own checks and in a message received from Stefan Kanthak. Here's a brief outline of what it's all about.<\/p>\n<p><!--more--><\/p>\n<h2>What is cURL?<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg05.met.vgwort.de\/na\/e9901f6fef3c42c095a7a94e5b32245b\" alt=\"\" width=\"1\" height=\"1\" \/><a href=\"https:\/\/de.wikipedia.org\/wiki\/CURL\" target=\"_blank\" rel=\"noopener\">cURL<\/a> (stands for Client for URLs or Curl URL Request Library) is on the one hand a program library and on the other hand a command line program for transferring files in computer networks. cURL is licensed under the open MIT license and has been ported to various operating systems.<\/p>\n<h2>cURL in Windows 10\/11 is outdated<\/h2>\n<p>Microsoft has been shipping cURL with Windows 10 (and also in Windows 11) since 2017, as you can read in these articles on the cURL website, as well as Microsoft's blog post Tar and Curl Come to Windows, last updated April 26, 2022. I had addressed it in December 2017 in the German blog post <a href=\"https:\/\/www.borncity.com\/blog\/2017\/12\/23\/windows-10-tar-und-curl-sollen-kommen\/\" target=\"_blank\" rel=\"noopener\">Windows 10: tar und curl sollen kommen<\/a>. The cURL website states:<\/p>\n<blockquote><p>All installs of Microsoft Windows 10 and Windows 11 get curl installed by default since then. The initial curl version Microsoft shipped was 7.55.1 but it was upgraded to 7.79.1 in January 2022.<\/p>\n<p>The Microsoft provided version is built to use the Schannel TLS backend. [&#8230;]<\/p>\n<p>The curl tool shipped with Windows is built by and handled by Microsoft. It is a separate build that will have different features and capabilities enabled and disabled compared to the <a href=\"https:\/\/curl.se\/windows\/\" target=\"_blank\" rel=\"noopener\">Windows builds<\/a> offered by the curl project. They do however build curl from the same source code. If you have problems with their curl version, report that to them.<\/p>\n<p>You can probably assume that the curl packages from Microsoft will always lag behind the versions provided by the curl project itself.<\/p><\/blockquote>\n<p>cURL for Windows has been updated to version 7.88.1 on February 20, 2023 according to the <a href=\"https:\/\/curl.se\/windows\/\" target=\"_blank\" rel=\"noopener\">cURL website<\/a>. If I query the cURL version on a Windows 10 with current patch level, I get this display:<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/i.imgur.com\/ziJ7t8e.jpg\" \/><\/p>\n<p>Windows 10 22H2 with patch level February 2023 reports a cURL 7.83.1 with a release date of May 13, 2022. They are 9 months behind the official release of the cURL project. If I query the Internet for \"cURL 7.83.1 vulnerabilities\", Google provides me with a link to the <a href=\"https:\/\/curl.se\/docs\/vuln-7.83.1.html\" target=\"_blank\" rel=\"noopener\">official cURL page<\/a>, where it says:<\/p>\n<blockquote><p>curl version <b>7.83.1<\/b> was released on <b>May 11 2022<\/b>. The following <b>13<\/b> security problems are known to exist in this version.<\/p><\/blockquote>\n<p>It's kind of silly to see how Microsoft acts. Microsoft's folks blow the fanfares about security features (secure boot, TPM, exploit protection, phishing protection, etc.), but at\u00a0 the same time they ship outdated libraries with known vulnerabilities on the users' systems. This is exactly the same like with products using the Electron framework like Teams &#8211; an ancient version of the Chromium browser with known vulnerabilities was also diligently shipped.<\/p>\n<h2>Microsoft knows that<\/h2>\n<p>One could still argue that \"something was overlooked\". But there is a method to it, the developers in Redmond know this and do nothing. In January 2022, after a hint from Stefan Kanthak, I had already addressed this topic in the blog post <a href=\"https:\/\/borncity.com\/win\/2022\/01\/21\/windows-january-2022-security-updates-for-curl-vulnerability-cve-2021-22947-a-tough-task-for-security-reporters\/\">Windows January 2022 security updates for cURL vulnerability CVE-2021-22947 \u2013 a tough task for security reporters<\/a>. Kanthak had provided me with communications with Microsoft pointing out security vulnerabilities in cURL.<\/p>\n<p>The days Stefan Kanthak sent me another email addressing above sloppiness regarding updating cURL in Windows 10 and Windows 11. Here is the text, without further comment on my part &#8211; I haven't translated it, because large parts are in English:<\/p>\n<blockquote>\n<pre>Hello Guenter,\r\n\r\nbeim CC: habe ich dummerweise (D)eine falsche Mail-Adresse angegeben.\r\n\r\nMagst Du ueber deren fortlaufende Schlamperei und Unfaehigkeit, die\r\neigenen Produktionssysteme mit aktuellen Quelltexten zu bestuecken,\r\nschreiben?\r\n\r\nmfg\r\nStefan\r\n\r\n\r\n----- Original Message -----\r\nFrom: \"Stefan Kanthak\" &lt;****&gt;\r\nTo: \"Microsoft Security Response Center\" &lt;secure@microsoft.com&gt;; &lt;certbund@bsi.bund.de&gt;; &lt;cert@cert.org&gt;\r\nCc: &lt;gborn@***&gt;; &lt;daniel@****&gt;\r\nSent: Monday, February 06, 2023 7:56 PM\r\nSubject: TEN unfixed CVEs in the OUTDATED version of curl.exe that Microsoft dares to ship with Windows!\r\n\r\n&gt; Hi @ll,\r\n&gt;\r\n&gt; Microsoft again\/still ships a ROTTEN and VULNERABLE version of curl.exe\r\n&gt; which is 4 releases behind and has TEN unfixed CVEs with Windows 10 and 11!\r\n&gt;\r\n&gt; Why do you ignore your own mantra \"Keep your systems up-to-date and patched\"?\r\n&gt;\r\n&gt; @MSRC: last time it took more than FIVE months, from 2021-07-21 until\r\n&gt;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 January 2022, to ship a version then \"just\" 2 releases behind.\r\n&gt;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 See MSRC Case 66388 CRM:0461283373\r\n&gt;\r\n&gt; @CERT Bund: wie waer's mit einer oeffentlichen Warnung vor diesem\r\n&gt;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 schlampig, fahr- und nachlaessig zusammengefrickelten Kram?\r\n&gt;\r\n&gt; @Daniel: please change your license to forbid the distribution of vulnerable\r\n&gt;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 binaries built from outdated sources!\r\n&gt;\r\n&gt; C:\\Users\\Stefan&gt;ver\r\n&gt;\r\n&gt; Microsoft Windows [Version 10.0.19044.2486]\r\n&gt;\r\n&gt; C:\\Users\\Stefan&gt;curl --version\r\n&gt; curl 7.83.1 (Windows) libcurl\/7.83.1 Schannel\r\n&gt; Release-Date: 2022-05-13\r\n&gt; Protocols: dict file ftp ftps http https imap imaps pop3 pop3s smtp smtps telnet tftp\r\n&gt; Features: AsynchDNS HSTS IPv6 Kerberos Largefile NTLM SPNEGO SSL SSPI UnixSockets\r\n&gt;\r\n&gt; From &lt;<a href=\"https:\/\/curl.se\/docs\/security.html\" target=\"_blank\" rel=\"noopener\">https:\/\/curl.se\/docs\/security.html<\/a>&gt;\r\n&gt;\r\n&gt; #\u00a0\u00a0\u00a0 S\u00a0 Vulnerability\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Date\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 First\u00a0\u00a0 Last\r\n&gt; 132\u00a0 ?\u00a0 CVE-2022-43552: HTTP Proxy deny use-after-free\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2022-12-21\u00a0 7.16.0\u00a0 7.86.0\r\n&gt; 131\u00a0 ?\u00a0 CVE-2022-43551: Another HSTS bypass via IDN\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2022-12-21\u00a0 7.77.0\u00a0 7.86.0\r\n&gt; 130\u00a0 ?\u00a0 CVE-2022-42916: HSTS bypass via IDN\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2022-10-26\u00a0 7.77.0\u00a0 7.85.0\r\n&gt; 129\u00a0 ?\u00a0 CVE-2022-42915: HTTP proxy double-free\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2022-10-26\u00a0 7.77.0\u00a0 7.85.0\r\n&gt; 128\u00a0 ?\u00a0 CVE-2022-35260: .netrc parser out-of-bounds access\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2022-10-26\u00a0 7.84.0\u00a0 7.85.0\r\n&gt; 127\u00a0 ?\u00a0 CVE-2022-32221: POST following PUT confusion\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2022-10-26\u00a0 7.7\u00a0\u00a0\u00a0\u00a0 7.85.0\r\n&gt; 126\u00a0 ?\u00a0 CVE-2022-35252: control code in cookie denial of service\u00a0 2022-08-31\u00a0 4.9\u00a0\u00a0\u00a0\u00a0 7.84.0\r\n&gt; 125\u00a0 ?\u00a0 CVE-2022-32208: FTP-KRB bad message verification\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2022-06-27\u00a0 7.16.4\u00a0 7.83.1\r\n&gt; 124\u00a0 ?\u00a0 CVE-2022-32207: Unpreserved file permissions\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2022-06-27\u00a0 7.69.0\u00a0 7.83.1\r\n&gt; 123\u00a0 ?\u00a0 CVE-2022-32206: HTTP compression denial of service\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2022-06-27\u00a0 7.57.0\u00a0 7.83.1\r\n&gt; 122\u00a0 ?\u00a0 CVE-2022-32205: Set-Cookie denial of service\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2022-06-27\u00a0 7.71.0\u00a0 7.83.1\r\n&gt;\r\n&gt; NOT AMUSED\r\n&gt; Stefan Kanthak\r\n&gt;\r\n&gt; ----- Original Message -----\r\n&gt; From: \"Stefan Kanthak\" &lt;stefan.kanthak@***&gt;\r\n&gt; To: \"Microsoft Security Response Center\" &lt;secure@microsoft.com&gt;\r\n&gt; Cc: &lt;daniel@***&gt;; &lt;cert@cert.org&gt;\r\n&gt; Sent: Wednesday, July 21, 2021 8:35 PM\r\n&gt; Subject: OUTDATED curl.exe 7.55.1\r\n&gt;\r\n&gt;&gt; Hi secure,\r\n&gt;&gt;\r\n&gt;&gt; Windows 10 20H1, 20H2 and 21H1 ship with an outdated and vulnerable\r\n&gt;&gt; curl.exe 7.55.1, 32 releases and at least 15 (in words: FIFTEEN) CVEs\r\n&gt;&gt; behind the current version 7.78.0: see\r\n&gt;&gt; &lt;https:\/\/curl.se\/docs\/releases.html&gt; and\r\n&gt;&gt; &lt;https:\/\/curl.se\/docs\/vulnerabilities.html&gt;\r\n&gt;&gt;\r\n&gt;&gt; | C:\\Users\\Public&gt;winver\r\n&gt;&gt; | Microsoft Windows [Version 10.0.19042.1083]\r\n&gt;&gt; |\r\n&gt;&gt; | C:\\Users\\Public&gt;curl -V\r\n&gt;&gt; | curl 7.55.1 (Windows) libcurl\/7.55.1 WinSSL\r\n&gt;&gt; | Release-Date: 2017-11-14, security patched: 2019-11-05\r\n&gt;&gt; | Protocols: dict file ftp ftps http https imap imaps pop3 pop3s smtp smtps telnet tftp\r\n&gt;&gt; | Features: AsynchDNS IPv6 Largefile SSPI Kerberos SPNEGO NTLM SSL\r\n&gt;&gt;\r\n&gt;&gt; Are your processes so bad that you can't build a current version and\r\n&gt;&gt; have to ship ROTTEN software instead?\r\n&gt;&gt;\r\n&gt;&gt; NOT amused\r\n&gt;&gt; Stefan Kanthak\r\n<\/pre>\n<\/blockquote>\n<p><strong>Similar articles:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/2022\/01\/21\/windows-january-2022-security-updates-for-curl-vulnerability-cve-2021-22947-a-tough-task-for-security-reporters\/\">Windows January 2022 security updates for cURL vulnerability CVE-2021-22947 \u2013 a tough task for security reporters<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/01\/20\/microsoft-teams-and-its-security\/\">Microsoft Teams and it's security<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]It's a messy story that I'm posting here on the blog again. Microsoft fails to ship cURL with Windows 10\/11 in such a way that the software is up to date and no longer has known vulnerabilities. I had already &hellip; <a href=\"https:\/\/borncity.com\/win\/2023\/02\/25\/windows-microsoft-liefert-curl-bibliothek-weiterhin-mit-schwachstellen-aus-feb-2023\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547,2],"tags":[69,1544,76,2643],"class_list":["post-28877","post","type-post","status-publish","format-standard","hentry","category-security","category-software","category-windows","tag-security","tag-software","tag-windows-10","tag-windows-11"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/28877","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=28877"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/28877\/revisions"}],"predecessor-version":[{"id":35739,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/28877\/revisions\/35739"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=28877"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=28877"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=28877"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}