Due to a mistake in libcurl's WebSocket code, a malicious server can send a particularly crafted packet which makes libcurl get trapped in an endless busy-loop. There is no other way for the application to escape or exit this loop other than killing the thread/process. This might be used to DoS libcurl-using application.
2025-06-07T08:15:20.687
2025-07-30T19:41:33.457
Analyzed
2499f714-1537-4658-8207-48ae4bb9eae9
CVSSv3.1: 7.5 (HIGH)