Ubuntu update for Wget



Published: 2019-04-08 | Updated: 2019-04-11
Risk High
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2018-20483
CVE-2019-5953
CWE-ID CWE-200
CWE-119
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
wget (Ubuntu package)
Operating systems & Components / Operating system package or component

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Information disclosure

EUVDB-ID: #VU16783

Risk: Low

CVSSv3.1: 3.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-20483

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local attacker to gain access to potentially sensitive information.

The vulnerability exists due to set_file_metadata in xattr.c stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file. A local attacker can read this attribute, as demonstrated by getfattr and obtain credentials contained in the URL.

Mitigation

Update the affected packages.

Ubuntu 18.10
wget - 1.19.5-1ubuntu1.1
Ubuntu 18.04 LTS
wget - 1.19.4-1ubuntu2.2
Ubuntu 16.04 LTS
wget - 1.17.1-1ubuntu1.5
Ubuntu 14.04 LTS
wget - 1.15-1ubuntu1.14.04.5

Vulnerable software versions

wget (Ubuntu package): 1.15-1ubuntu1.14.04.1 - 1.19.4-1ubuntu2.1

CPE2.3 External links

http://usn.ubuntu.com/3943-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Buffer overflow

EUVDB-ID: #VU18143

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-5953

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when handling Internationalized Resource Identifiers (IRI) during recursive downloading. A remote attacker can trick the victim to connect to a malicious web server, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected packages.

Ubuntu 18.10
wget - 1.19.5-1ubuntu1.1
Ubuntu 18.04 LTS
wget - 1.19.4-1ubuntu2.2
Ubuntu 16.04 LTS
wget - 1.17.1-1ubuntu1.5
Ubuntu 14.04 LTS
wget - 1.15-1ubuntu1.14.04.5

Vulnerable software versions

wget (Ubuntu package): 1.15-1ubuntu1.14.04.1 - 1.19.4-1ubuntu2.1

CPE2.3 External links

http://usn.ubuntu.com/3943-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###