![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2017-13089 |
Description: | The http.c:skip_short_body() function is called in some circumstances, such as when processing redirects. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non- negative number. The code then tries to skip the chunk in pieces of 512 bytes by using the MIN() macro, but ends up passing the negative chunk length to connect.c:fd_read(). As fd_read() takes an int argument, the high 32 bits of the chunk length are discarded, leaving fd_read() with a completely attacker controlled length argument. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.891149 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-13089 BugTraq ID: 101592 http://www.securityfocus.com/bid/101592 Debian Security Information: DSA-4008 (Google Search) http://www.debian.org/security/2017/dsa-4008 https://security.gentoo.org/glsa/201711-06 https://github.com/r1b/CVE-2017-13089 https://www.viestintavirasto.fi/en/cybersecurity/vulnerabilities/2017/haavoittuvuus-2017-037.html RedHat Security Advisories: RHSA-2017:3075 https://access.redhat.com/errata/RHSA-2017:3075 http://www.securitytracker.com/id/1039661 |