A buffer overflow vulnerability was found in GNU Wget 1.20.1 and earlier. An attacker may be able to cause a denial-of-service (DoS) or may execute an arbitrary code.
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=562eacb76a2b64d5dc80a443f0f739bc9ef76c17 (cosmetic, removes debug lines)
This issue did not affect the versions of wget as shipped with Red Hat Enterprise Linux 5 and 6.
This issue affects the versions of wget as shipped with Red Hat Enterprise Linux 7.
Created wget tracking bugs for this issue:
Affects: fedora-all [bug 1696738]
The new buffer overflow bug fixed upstream in versions 1.20.2 and 1.20.3
The vulnerability is a heap-based buffer overflow within the "do_conversion()" function in src/iri.c when processing Internationalized Resource Identifiers. An attacker can exploit this vulnerability to cause a crash and, potentially, execute arbitrary code by, for example, tricking a user into recursively downloading a specially crafted website.
Upstream announced a fix for this issue as part of version 1.20.2. However, this version did not actually contain the necessary code changes, thus leaving version 1.20.2 vulnerable. Version 1.20.3 fixed this.