wget-1.14-15.el7.1

エラータID: AXSA:2017-2381:03

Release date: 
Wednesday, November 1, 2017 - 17:31
Subject: 
wget-1.14-15.el7.1
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.

Security Fix(es):

* A stack-based and a heap-based buffer overflow flaws were found in wget when processing chunked encoded HTTP responses. By tricking an unsuspecting user into connecting to a malicious HTTP server, an attacker could exploit these flaws to potentially execute arbitrary code. (CVE-2017-13089, CVE-2017-13090)

Asianux would like to thank the GNU Wget project for reporting these issues.

CVE-2017-13089
The http.c:skip_short_body() function is called in some circumstances,
such as when processing redirects. When the response is sent chunked
in wget before 1.19.2, the chunk parser uses strtol() to read each
chunk's length, but doesn't check that the chunk length is a
non-negative number. The code then tries to skip the chunk in pieces
of 512 bytes by using the MIN() macro, but ends up passing the
negative chunk length to connect.c:fd_read(). As fd_read() takes an
int argument, the high 32 bits of the chunk length are discarded,
leaving fd_read() with a completely attacker controlled length
argument.
CVE-2017-13090
The retr.c:fd_read_body() function is called when processing OK
responses. When the response is sent chunked in wget before 1.19.2,
the chunk parser uses strtol() to read each chunk's length, but
doesn't check that the chunk length is a non-negative number. The code
then tries to read the chunk in pieces of 8192 bytes by using the
MIN() macro, but ends up passing the negative chunk length to
retr.c:fd_read(). As fd_read() takes an int argument, the high 32 bits
of the chunk length are discarded, leaving fd_read() with a completely
attacker controlled length argument. The attacker can corrupt malloc
metadata after the allocated buffer.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. wget-1.14-15.el7.1.src.rpm
    MD5: faeb03a697bd1c44c1dc458162eada6c
    SHA-256: 19bbfcdb31298cd0769952e33dd83ce4d27e4e7916fbcd60f12c4de01e0fc7d6
    Size: 1.56 MB

Asianux Server 7 for x86_64
  1. wget-1.14-15.el7.1.x86_64.rpm
    MD5: 04e5234ff8c6a17629a6f60e9c8694c9
    SHA-256: 868d084598727f129a19cd3ac3ac689498e79c128db8701f4ea8308d25bc7846
    Size: 545.91 kB