Bug 170670

Summary: CAN-2005-3185 NTLM buffer overflow
Product: [Fedora] Fedora Reporter: Josh Bressers <bressers>
Component: wgetAssignee: Karsten Hopp <karsten>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: medium    
Version: 4Keywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://article.gmane.org/gmane.comp.web.wget.general/5064
Whiteboard: reported=20051012,public=20051012,impact=important,source=vendorsec
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2005-10-19 13:35:54 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Josh Bressers 2005-10-13 17:32:01 UTC
+++ This bug was initially created as a clone of Bug #170666 +++

The NTLM authentication code in wget was derived form the libcurl NTLM auth, so
wget is vulnerable to this issue.

This text was scavanged from the libcurl advisory:

libcurl's NTLM function can overflow a stack-based buffer if given a too long
user name or domain name. This would happen if you enable NTLM authentication
and either:

 A - pass in a user name and domain name to libcurl that together are longer
     than 192 bytes

 B - allow (lib)curl to follow HTTP "redirects" (Location: and the appropriate
     HTTP 30x response code) and the new URL contains a URL with a user name
     and domain name that together are longer than 192 bytes

-- Additional comment from bressers on 2005-10-13 13:24 EST --
Created an attachment (id=119931)
Proposed patch from upstream

Comment 1 Josh Bressers 2005-10-13 17:33:18 UTC
This issue also affects FC3

Comment 2 Mark J. Cox 2005-10-14 10:24:21 UTC
On Fedora Core 4 this is not a security issue; wget is compiled using
-D_FORTIFY_SOURCE=2 which catches and blocks this issue.  Therefore on Fedora
Core 4 this can only result in the program being aborted, which is not classed
as a security issue.

Please make a note of this in the advisory of any FC4 update to wget.

Comment 3 Fedora Update System 2005-10-17 16:20:50 UTC
From User-Agent: XML-RPC

wget-1.10.2-0.fc4 has been pushed for FC4, which should resolve this issue.  If these problems are still present in this version, then please make note of it in this bug report.