Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.812056
Kategorie:Red Hat Local Security Checks
Titel:RedHat Update for wget RHSA-2017:3075-01
Zusammenfassung:The remote host is missing an update for the 'wget'; package(s) announced via the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'wget'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The wget packages provide the GNU
Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.

Security Fix(es):

* A stack-based and a heap-based buffer overflow flaws were found in wget
when processing chunked encoded HTTP responses. By tricking an unsuspecting
user into connecting to a malicious HTTP server, an attacker could exploit
these flaws to potentially execute arbitrary code. (CVE-2017-13089,
CVE-2017-13090)

Red Hat would like to thank the GNU Wget project for reporting these
issues.

Affected Software/OS:
wget on Red Hat Enterprise Linux Server (v. 7)

Solution:
Please Install the Updated Packages.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2017-13089
BugTraq ID: 101592
http://www.securityfocus.com/bid/101592
Debian Security Information: DSA-4008 (Google Search)
http://www.debian.org/security/2017/dsa-4008
https://security.gentoo.org/glsa/201711-06
https://github.com/r1b/CVE-2017-13089
https://www.viestintavirasto.fi/en/cybersecurity/vulnerabilities/2017/haavoittuvuus-2017-037.html
RedHat Security Advisories: RHSA-2017:3075
https://access.redhat.com/errata/RHSA-2017:3075
http://www.securitytracker.com/id/1039661
Common Vulnerability Exposure (CVE) ID: CVE-2017-13090
BugTraq ID: 101590
http://www.securityfocus.com/bid/101590
CopyrightCopyright (C) 2017 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.