Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2017.0396
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2017-0396)
Summary:The remote host is missing an update for the 'wget' package(s) announced via the MGASA-2017-0396 advisory.
Description:Summary:
The remote host is missing an update for the 'wget' package(s) announced via the MGASA-2017-0396 advisory.

Vulnerability Insight:
The http.c:skip_short_body() function is called in some circumstances,
such as when processing redirects. When the response is sent chunked,
the chunk parser uses strtol() to read each chunk's length, but
doesn't check that the chunk length is a non-negative number. The
code then tries to skip the chunk in pieces of 512 bytes by using the
MIN() macro, but ends up passing the negative chunk length to
connect.c:fd_read(). As fd_read() takes an int argument, the high
32 bits of the chunk length are discarded, leaving fd_read() with
a completely attacker controlled length argument (CVE-2017-13089).

The retr.c:fd_read_body() function is called when processing OK
responses. When the response is sent chunked, the chunk parser uses
strtol() to read each chunk's length, but doesn't check that the chunk
length is a non-negative number. The code then tries to read the chunk
in pieces of 8192 bytes by using the MIN() macro, but ends up passing
the negative chunk length to retr.c:fd_read(). As fd_read() takes an
int argument, the high 32 bits of the chunk length are discarded,
leaving fd_read() with a completely attacker controlled length
argument. The attacker can corrupt malloc metadata after the allocated
buffer (CVE-2017-13090).

Affected Software/OS:
'wget' package(s) on Mageia 5, Mageia 6.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-13089
BugTraq ID: 101592
http://www.securityfocus.com/bid/101592
Debian Security Information: DSA-4008 (Google Search)
http://www.debian.org/security/2017/dsa-4008
https://security.gentoo.org/glsa/201711-06
https://github.com/r1b/CVE-2017-13089
https://www.viestintavirasto.fi/en/cybersecurity/vulnerabilities/2017/haavoittuvuus-2017-037.html
RedHat Security Advisories: RHSA-2017:3075
https://access.redhat.com/errata/RHSA-2017:3075
http://www.securitytracker.com/id/1039661
Common Vulnerability Exposure (CVE) ID: CVE-2017-13090
BugTraq ID: 101590
http://www.securityfocus.com/bid/101590
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.