Bird_banner_small4
GNU Wget skip_short_body Stack Buffer Overflow
TSL ID TSL20171027-05
CVE ID(s) CVE-2017-13089
Severity High
Description

A stack buffer overflow vulnerability has been reported in Wget. The vulnerability is due to improper handling of HTTP responses with chunked transfer-encoding within the skip_short_body() function.

A remote, unauthenticated attacker could exploit this vulnerability by enticing a user to make an HTTP request with the affected application. Successful exploitation could lead to arbitrary code execution within the context of the user.

The vendor, GNU, has released the following updates regarding these vulnerabilities:

http://git.savannah.gnu.org/cgit/wget.git/commit/?id=d892291fb8ace4c3b734ea5125770989c215df3f

Affected Products
  • GNU wget prior to 1.19.2
CVSS Score Base 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P):
  • Access vector is NETWORK
  • Access complexity is MEDIUM
  • Level of authentication required is NONE
  • Impact of this vulnerability on data confidentiality is PARTIAL
  • Impact of this vulnerability on data integrity is PARTIAL
  • Impact of this vulnerability on data availability is PARTIAL
Temporal 5.0 (E:U/RL:OF/RC:C):
  • The exploitability level of this vulnerability is UNPROVEN
  • The remediation level of this vulnerability is OFFICIAL FIX
  • The report confidence level of this vulnerability is CONFIRMED
References http://git.savannah.gnu.org/cgit/wget.git/commit/?id=d892291fb8ace4c3b734ea5125770989c215df3f
https://bugzilla.redhat.com/show_bug.cgi?id=1505444
https://www.viestintavirasto.fi/en/cybersecurity/vulnerabilities/2017/haavoittuvuus-2017-037.html
Related Threats