+++ This bug was initially created as a clone of Bug #170666 +++ The NTLM authentication code in wget was derived form the libcurl NTLM auth, so wget is vulnerable to this issue. This text was scavanged from the libcurl advisory: libcurl's NTLM function can overflow a stack-based buffer if given a too long user name or domain name. This would happen if you enable NTLM authentication and either: A - pass in a user name and domain name to libcurl that together are longer than 192 bytes B - allow (lib)curl to follow HTTP "redirects" (Location: and the appropriate HTTP 30x response code) and the new URL contains a URL with a user name and domain name that together are longer than 192 bytes -- Additional comment from bressers on 2005-10-13 13:24 EST -- Created an attachment (id=119931) Proposed patch from upstream
This issue also affects FC3
On Fedora Core 4 this is not a security issue; wget is compiled using -D_FORTIFY_SOURCE=2 which catches and blocks this issue. Therefore on Fedora Core 4 this can only result in the program being aborted, which is not classed as a security issue. Please make a note of this in the advisory of any FC4 update to wget.
From User-Agent: XML-RPC wget-1.10.2-0.fc4 has been pushed for FC4, which should resolve this issue. If these problems are still present in this version, then please make note of it in this bug report.