Red Hat Bugzilla – Bug 170670
CAN-2005-3185 NTLM buffer overflow
Last modified: 2007-11-30 17:11:15 EST
+++ This bug was initially created as a clone of Bug #170666 +++
The NTLM authentication code in wget was derived form the libcurl NTLM auth, so
wget is vulnerable to this issue.
This text was scavanged from the libcurl advisory:
libcurl's NTLM function can overflow a stack-based buffer if given a too long
user name or domain name. This would happen if you enable NTLM authentication
A - pass in a user name and domain name to libcurl that together are longer
than 192 bytes
B - allow (lib)curl to follow HTTP "redirects" (Location: and the appropriate
HTTP 30x response code) and the new URL contains a URL with a user name
and domain name that together are longer than 192 bytes
-- Additional comment from email@example.com on 2005-10-13 13:24 EST --
Created an attachment (id=119931)
Proposed patch from upstream
This issue also affects FC3
On Fedora Core 4 this is not a security issue; wget is compiled using
-D_FORTIFY_SOURCE=2 which catches and blocks this issue. Therefore on Fedora
Core 4 this can only result in the program being aborted, which is not classed
as a security issue.
Please make a note of this in the advisory of any FC4 update to wget.
From User-Agent: XML-RPC
wget-1.10.2-0.fc4 has been pushed for FC4, which should resolve this issue. If these problems are still present in this version, then please make note of it in this bug report.