SUSE-SA:2005:063: curl, wget

high Nessus Plugin ID 20087

Synopsis

The remote host is missing a vendor-supplied security patch

Description

The remote host is missing the patch for the advisory SUSE-SA:2005:063 (curl, wget).


This update fixes a stack-based buffer overflow in the NTLM authentication code used by the file download tools/libraries curl and wget that can be triggered by using a long user or domain name (also works with HTTP redirects).

By exploiting this bug by using a malicious server an attacker may be able to execute arbitrary code with the privileges of the entity running the process locally. (CVE-2005-3185)

This affects both curl/libcurl and wget >= 1.10. wget copied the code from libcurl, making this effectively the same problem.

Solution

http://www.suse.de/security/advisories/2005_63_wget_curl.html

Plugin Details

Severity: High

ID: 20087

File Name: suse_SA_2005_063.nasl

Version: 1.9

Agent: unix

Published: 10/25/2005

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Vulnerability Information

Required KB Items: Host/SuSE/rpm-list