libcurl's ASN1 parser code has the GTime2str() function, used for parsing an ASN.1 (CVE-2024-7264)
|
Brocade Security Advisory ID |
BSA-2025-2737 |
|
Component |
libcurl |
|
CWE |
CWE-125 |
|
|
|
Summary
A flaw was found in libcurl, where libcurl's ASN1 parser code has the GTime2str() function, used for parsing an ASN.1 Generalized Time field. If a syntactically incorrect field is given, the parser can use -1 for the length of the time fraction, leading to a strlen() performed on a pointer to a heap buffer area that is not purposely NULL terminated.
Products Affected
- No Brocade Fibre channel products from Broadcom are affected
Products Not Affected
- Brocade SANnav versions before SANnav 2.4.0b contain the vulnerable component, but are not exploitable [VEX Justification: Vulnerable_code_not_in_execute_path]
- Brocade Fabric OS
[VEX Justification: Component_not_present] - Brocade ASCG
[VEX Justification: Component_not_present]
Solution
- While not exploitable, a security update is included in Brocade SANnav versions 2.4.0b and 3.0.0
Revision History
|
Version |
Change |
Date |
|
1.0 |
Initial Publication |
January 27, 2026 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.