{"id":"USN-3464-1","summary":"wget vulnerabilities","details":"Antti Levomäki, Christian Jalio, and Joonas Pihlaja discovered that Wget\nincorrectly handled certain HTTP responses. A remote attacker could use\nthis issue to cause Wget to crash, resulting in a denial of service, or\npossibly execute arbitrary code. (CVE-2017-13089, CVE-2017-13090)\n\nDawid Golunski discovered that Wget incorrectly handled recursive or\nmirroring mode. A remote attacker could possibly use this issue to bypass\nintended access list restrictions. (CVE-2016-7098)\n\nOrange Tsai discovered that Wget incorrectly handled CRLF sequences in\nHTTP headers. A remote attacker could possibly use this issue to inject\narbitrary HTTP headers. (CVE-2017-6508)\n","modified":"2026-02-10T04:41:13Z","published":"2017-10-26T16:54:04Z","related":["UBUNTU-CVE-2016-7098","UBUNTU-CVE-2017-13089","UBUNTU-CVE-2017-13090","UBUNTU-CVE-2017-6508"],"upstream":["CVE-2016-7098","CVE-2017-13089","CVE-2017-13090","CVE-2017-6508","UBUNTU-CVE-2016-7098","UBUNTU-CVE-2017-13089","UBUNTU-CVE-2017-13090","UBUNTU-CVE-2017-6508"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3464-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7098"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-6508"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13089"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13090"}],"affected":[{"package":{"name":"wget","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/wget@1.15-1ubuntu1.14.04.3?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.15-1ubuntu1.14.04.3"}]}],"versions":["1.14-2ubuntu1","1.14-5ubuntu1","1.15-1ubuntu1","1.15-1ubuntu1.14.04.1","1.15-1ubuntu1.14.04.2"],"ecosystem_specific":{"binaries":[{"binary_name":"wget","binary_version":"1.15-1ubuntu1.14.04.3"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2016-7098"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-6508"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-13089"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-13090"}],"ecosystem":"Ubuntu:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3464-1.json"}},{"package":{"name":"wget","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/wget@1.17.1-1ubuntu1.3?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.17.1-1ubuntu1.3"}]}],"versions":["1.16.1-1ubuntu1","1.17.1-1ubuntu1","1.17.1-1ubuntu1.1","1.17.1-1ubuntu1.2"],"ecosystem_specific":{"binaries":[{"binary_name":"wget","binary_version":"1.17.1-1ubuntu1.3"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2016-7098"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-6508"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-13089"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-13090"}],"ecosystem":"Ubuntu:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3464-1.json"}}],"schema_version":"1.7.3"}