Learn about CVE-2017-13090, a high-severity vulnerability in GNU Wget versions prior to 1.19.2. Understand the impact, affected systems, exploitation mechanism, and mitigation steps.
CVE-2017-13090, published on October 27, 2017, addresses a heap overflow vulnerability in GNU Wget versions prior to 1.19.2. The vulnerability allows attackers to manipulate malloc metadata following the allocated buffer.
Understanding CVE-2017-13090
What is CVE-2017-13090?
In versions of GNU Wget prior to 1.19.2, a heap overflow vulnerability exists in the HTTP protocol handling. This vulnerability enables attackers to fully control the length argument passed to the function fd_read(), potentially leading to malicious activities.
The Impact of CVE-2017-13090
The vulnerability has a CVSS base score of 8.8, indicating a high severity level. It affects confidentiality, integrity, and availability, with no privileges required for exploitation.
Technical Details of CVE-2017-13090
Vulnerability Description
When processing OK responses, the function retr.c:fd_read_body() is invoked. In affected versions, the chunk parser fails to verify that the chunk length is a non-negative number, allowing attackers to control the length argument passed to fd_read().
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates