|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for wget RHSA-2017:3075-01|
|Summary:||The remote host is missing an update for the 'wget'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'wget'
package(s) announced via the referenced advisory.
The wget packages provide the GNU
Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.
* A stack-based and a heap-based buffer overflow flaws were found in wget
when processing chunked encoded HTTP responses. By tricking an unsuspecting
user into connecting to a malicious HTTP server, an attacker could exploit
these flaws to potentially execute arbitrary code. (CVE-2017-13089,
Red Hat would like to thank the GNU Wget project for reporting these
wget on Red Hat Enterprise Linux Server (v. 7)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2017-13089|
Common Vulnerability Exposure (CVE) ID: CVE-2017-13090
|Copyright||Copyright (C) 2017 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.