Joined: 12 May 2004
|Posted: Tue Oct 20, 2009 8:26 pm Post subject: [ GLSA 200910-01 ] Wget: Certificate validation error
|Gentoo Linux Security Advisory
Title: Wget: Certificate validation error (GLSA 200910-01)
Date: October 20, 2009
An error in the X.509 certificate handling of Wget might enable remote
attackers to conduct man-in-the-middle attacks.
GNU Wget is a free software package for retrieving files using HTTP,
HTTPS and FTP, the most widely-used Internet protocols.
Vulnerable: < 1.12
Unaffected: >= 1.12
Architectures: All supported architectures
The vendor reported that Wget does not properly handle Common Name (CN)
fields in X.509 certificates that contain an ASCII NUL ( ) character.
Specifically, the processing of such fields is stopped at the first
occurrence of a NUL character. This type of vulnerability was recently
discovered by Dan Kaminsky and Moxie Marlinspike.
A remote attacker might employ a specially crafted X.509 certificate,
containing a NUL character in the Common Name field to conduct
man-in-the-middle attacks on SSL connections made using Wget.
There is no known workaround at this time.
All Wget users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/wget-1.12"
Last edited by GLSA on Sun Nov 22, 2009 4:29 am; edited 1 time in total