Lucene search

K
centosCentOS ProjectCESA-2009:1549
HistoryNov 03, 2009 - 9:48 p.m.

wget security update

2009-11-0321:48:02
CentOS Project
lists.centos.org
42

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

73.7%

CentOS Errata and Security Advisory CESA-2009:1549

GNU Wget is a file retrieval utility that can use HTTP, HTTPS, and FTP.

Daniel Stenberg reported that Wget is affected by the previously published
β€œnull prefix attack”, caused by incorrect handling of NULL characters in
X.509 certificates. If an attacker is able to get a carefully-crafted
certificate signed by a trusted Certificate Authority, the attacker could
use the certificate during a man-in-the-middle attack and potentially
confuse Wget into accepting it by mistake. (CVE-2009-3490)

Wget users should upgrade to this updated package, which contains a
backported patch to correct this issue.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2009-November/078460.html
https://lists.centos.org/pipermail/centos-announce/2009-November/078461.html
https://lists.centos.org/pipermail/centos-announce/2009-November/078468.html
https://lists.centos.org/pipermail/centos-announce/2009-November/078469.html
https://lists.centos.org/pipermail/centos-announce/2009-November/078486.html
https://lists.centos.org/pipermail/centos-announce/2009-November/078487.html

Affected packages:
wget

Upstream details at:
https://access.redhat.com/errata/RHSA-2009:1549

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

73.7%