[USN-3464-1] Wget vulnerabilities

Marc Deslauriers marc.deslauriers at canonical.com
Thu Oct 26 19:04:17 UTC 2017

Ubuntu Security Notice USN-3464-1
October 26, 2017

wget vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.10
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS


Several security issues were fixed in Wget.

Software Description:
- wget: retrieves files from the web


Antti Levomäki, Christian Jalio, and Joonas Pihlaja discovered that Wget
incorrectly handled certain HTTP responses. A remote attacker could use
this issue to cause Wget to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2017-13089, CVE-2017-13090)

Dawid Golunski discovered that Wget incorrectly handled recursive or
mirroring mode. A remote attacker could possibly use this issue to bypass
intended access list restrictions. (CVE-2016-7098)

Orange Tsai discovered that Wget incorrectly handled CRLF sequences in
HTTP headers. A remote attacker could possibly use this issue to inject
arbitrary HTTP headers. (CVE-2017-6508)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.10:
  wget                            1.19.1-3ubuntu1.1

Ubuntu 17.04:
  wget                            1.18-2ubuntu1.1

Ubuntu 16.04 LTS:
  wget                            1.17.1-1ubuntu1.3

Ubuntu 14.04 LTS:
  wget                            1.15-1ubuntu1.14.04.3

In general, a standard system update will make all the necessary changes.

  CVE-2016-7098, CVE-2017-13089, CVE-2017-13090, CVE-2017-6508

Package Information:

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20171026/a2bdb6ca/attachment.sig>

More information about the ubuntu-security-announce mailing list