CVE-2017-13089

Scores

EPSS

0.758medium75.8%
0%20%40%60%80%100%

Percentile: 75.8%

CVSS

7.8high3.x
0246810

CVSS Score: 7.8/10

All CVSS Scores

CVSS 3.x
7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS 2.0
9.3

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Description

The http.c:skip_short_body() function is called in some circumstances, such as when processing redirects. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk’s length, but doesn’t check that the chunk length is a non-negative number. The code then tries to skip the chunk in pieces of 512 bytes by using the MIN() macro, but ends up passing the negative chunk length to connect.c:fd_read(). As fd_read() takes an int argument, the high 32 bits of the chunk length are discarded, leaving fd_read() with a completely attacker controlled length argument.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhatubuntu

CWEs

CWE-121

Related Vulnerabilities

Exploits

Exploit ID: CVE-2017-13089

Source: github-poc

URL: https://github.com/mzeyong/CVE-2017-13089

Recommendations

Source: nvd

All Wget users should upgrade to the latest version:
# emerge –sync
# emerge –ask –oneshot –verbose “>=net-misc/wget-1.19.1-r2”

URL: https://security.gentoo.org/glsa/201711-06

Vulnerable Software (9)

Type: Configuration

Product: wget

Operating System: rhel 7

Trait:
{  "fixed": "1.14-15.el7_4.1"}

Source: redhat

Type: Configuration

Product: wget

Operating System: ubuntu artful 17.10

Trait:
{  "fixed": "1.19.1-3ubuntu1.1"}

Source: ubuntu

Type: Configuration

Product: wget

Operating System: ubuntu trusty 14.04

Trait:
{  "fixed": "1.15-1ubuntu1.14.04.3"}

Source: ubuntu

Type: Configuration

Product: wget

Operating System: ubuntu xenial 16.04

Trait:
{  "fixed": "1.17.1-1ubuntu1.3"}

Source: ubuntu

Type: Configuration

Product: wget

Operating System: ubuntu zesty 17.04

Trait:
{  "fixed": "1.18-2ubuntu1.1"}

Source: ubuntu

Type: Configuration

Product: wget

Operating System: altlinux

Trait:
{  "fixed": "0:1.19.2-alt1"}

Source: redhat

Type: Configuration

Product: wget

Operating System: debian

Trait:
{  "fixed": "1.19.2-1"}

Source: debian

Type: Configuration

Vendor: *

Product: debian_linux

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",...

Source: nvd

Type: Configuration

Vendor: *

Product: wget

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*",      "versionEndIncluding": "1.19.1",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

End of list