Executive Summary

Summary
Title GNU Wget: Header injection
Informations
Name GLSA-201706-16 First vendor Publication 2017-06-20
Vendor Gentoo Last vendor Modification 2017-06-20
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

A header injection vulnerability in GNU Wget might allow remote attackers to inject arbitrary HTTP headers.

Background

GNU Wget is a free software package for retrieving files using HTTP, HTTPS and FTP, the most widely-used Internet protocols.

Description

It was discovered that there was a header injection vulnerability in GNU Wget which allowed remote attackers to inject arbitrary HTTP headers via CRLF sequences in the host subcomponent of a URL.

Impact

A remote attacker could inject arbitrary HTTP headers in requests by tricking a user running GNU Wget into processing crafted URLs.

Workaround

There is no known workaround at this time.

Resolution

All GNU Wget users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/wget-1.19.1-r1"

References

[ 1 ] CVE-2017-6508 : http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6508

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/201706-16

Original Source

Url : http://security.gentoo.org/glsa/glsa-201706-16.xml

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-93 Failure to Sanitize CRLF Sequences ('CRLF Injection')

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 25

Nessus® Vulnerability Scanner

Date Description
2018-08-17 Name : The remote PhotonOS host is missing multiple security updates.
File : PhotonOS_PHSA-2017-0023.nasl - Type : ACT_GATHER_INFO
2018-08-17 Name : The remote PhotonOS host is missing multiple security updates.
File : PhotonOS_PHSA-2017-2_0-0008.nasl - Type : ACT_GATHER_INFO
2017-10-27 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-3464-1.nasl - Type : ACT_GATHER_INFO
2017-09-01 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2017-881.nasl - Type : ACT_GATHER_INFO
2017-07-17 Name : The remote Fedora host is missing a security update.
File : fedora_2017-38c3781b89.nasl - Type : ACT_GATHER_INFO
2017-06-21 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201706-16.nasl - Type : ACT_GATHER_INFO
2017-06-13 Name : The remote Fedora host is missing a security update.
File : fedora_2017-ed1c665a3f.nasl - Type : ACT_GATHER_INFO
2017-06-05 Name : The remote Fedora host is missing a security update.
File : fedora_2017-22f1a8404e.nasl - Type : ACT_GATHER_INFO
2017-03-31 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2017-412.nasl - Type : ACT_GATHER_INFO
2017-03-23 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2017-0799-1.nasl - Type : ACT_GATHER_INFO
2017-03-23 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2017-0800-1.nasl - Type : ACT_GATHER_INFO
2017-03-10 Name : The remote Debian host is missing a security update.
File : debian_DLA-851.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2017-06-22 13:23:57
  • Multiple Updates
2017-06-20 21:21:36
  • First insertion