cognitive cybersecurity intelligence

News and Analysis


How to Scan Your Environment for Vulnerable Versions of Curl

A high severity vulnerability was discovered in the common Unix and Linux networking tool curl and its library, libcurl. Though not exploitable under default conditions, trigger requirements for the vulnerability include pointing curl to a malicious server via a SOCKS5 proxy and setting the buffer size to a smaller size. To secure systems, security teams must identify all systems using curl and libcurl and apply updates. Monitoring inappropriate curl flags for large strings is also recommended.

Source: –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts

A Better Connected Care Journey

The article urges healthcare organizations to move towards integrated, digitally enabled care delivery, replacing outdated point solutions. It acknowledges some may need help overcoming hurdles.