Bug 1695679 (CVE-2019-5953)
Summary: | CVE-2019-5953 wget: do_conversion() heap-based buffer overflow vulnerability | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | apmukher, karsten, thozza |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | wget 1.20.3 | Doc Type: | If docs needed, set a value |
Doc Text: |
A buffer overflow flaw was found in the GNU Wget in version 1.20.1 and earlier when processing Internationalized Resource Identifiers. This flaw allows an attacker to execute arbitrary code or cause a denial of service.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-05-14 16:13:54 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1696733, 1696734, 1696735, 1696736, 1696738, 1733631, 1733632 | ||
Bug Blocks: | 1695681 |
Description
Pedro Sampaio
2019-04-03 15:20:02 UTC
Patch: http://git.savannah.gnu.org/cgit/wget.git/commit/?id=692d5c5215de0db482c252492a92fc424cc6a97c http://git.savannah.gnu.org/cgit/wget.git/commit/?id=562eacb76a2b64d5dc80a443f0f739bc9ef76c17 (cosmetic, removes debug lines) Statement: This issue did not affect the versions of wget as shipped with Red Hat Enterprise Linux 5 and 6. This issue affects the versions of wget as shipped with Red Hat Enterprise Linux 7. Created wget tracking bugs for this issue: Affects: fedora-all [bug 1696738] The new buffer overflow bug fixed upstream in versions 1.20.2 and 1.20.3 http://lists.gnu.org/archive/html/bug-wget/2019-04/msg00001.html http://lists.gnu.org/archive/html/bug-wget/2019-04/msg00015.html The vulnerability is a heap-based buffer overflow within the "do_conversion()" function in src/iri.c when processing Internationalized Resource Identifiers. An attacker can exploit this vulnerability to cause a crash and, potentially, execute arbitrary code by, for example, tricking a user into recursively downloading a specially crafted website. Upstream announced a fix for this issue as part of version 1.20.2. However, this version did not actually contain the necessary code changes, thus leaving version 1.20.2 vulnerable. Version 1.20.3 fixed this. This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:0983 https://access.redhat.com/errata/RHSA-2019:0983 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:1228 https://access.redhat.com/errata/RHSA-2019:1228 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.5 Extended Update Support Via RHSA-2019:2979 https://access.redhat.com/errata/RHSA-2019:2979 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Advanced Update Support Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions Red Hat Enterprise Linux 7.4 Telco Extended Update Support Via RHSA-2019:3168 https://access.redhat.com/errata/RHSA-2019:3168 |