Vulnerabilities > CVE-2009-3490 - Cryptographic Issues vulnerability in GNU Wget
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
GNU Wget before 1.12 does not properly handle a '\0' character in a domain name in the Common Name field of an X.509 certificate, which allows man-in-the-middle remote attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | Gnu
| 23 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Nessus
NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2009-1549.NASL description An updated wget package that fixes a security issue is now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. GNU Wget is a file retrieval utility that can use HTTP, HTTPS, and FTP. Daniel Stenberg reported that Wget is affected by the previously published last seen 2020-06-01 modified 2020-06-02 plugin id 67069 published 2013-06-29 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67069 title CentOS 3 / 4 / 5 : wget (CESA-2009:1549) NASL family Scientific Linux Local Security Checks NASL id SL_20091103_WGET_ON_SL3_X.NASL description CVE-2009-3490 wget: incorrect verification of SSL certificate with NUL in name Daniel Stenberg reported that Wget is affected by the previously published last seen 2020-06-01 modified 2020-06-02 plugin id 60690 published 2012-08-01 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/60690 title Scientific Linux Security Update : wget on SL3.x, SL4.x, SL5.x i386/x86_64 NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200910-01.NASL description The remote host is affected by the vulnerability described in GLSA-200910-01 (Wget: Certificate validation error) The vendor reported that Wget does not properly handle Common Name (CN) fields in X.509 certificates that contain an ASCII NUL (\\0) character. Specifically, the processing of such fields is stopped at the first occurrence of a NUL character. This type of vulnerability was recently discovered by Dan Kaminsky and Moxie Marlinspike. Impact : A remote attacker might employ a specially crafted X.509 certificate, containing a NUL character in the Common Name field to conduct man-in-the-middle attacks on SSL connections made using Wget. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 42197 published 2009-10-22 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/42197 title GLSA-200910-01 : Wget: Certificate validation error NASL family Solaris Local Security Checks NASL id SOLARIS10_125215-05.NASL description SunOS 5.10: wget patch. Date this patch was last updated by Sun : Jan/19/15 last seen 2020-06-01 modified 2020-06-02 plugin id 107421 published 2018-03-12 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/107421 title Solaris 10 (sparc) : 125215-05 NASL family Fedora Local Security Checks NASL id FEDORA_2009-11836.NASL description - Wed Nov 18 2009 Karsten Hopp <karsten at redhat.com> 1.12-2 - don last seen 2020-06-01 modified 2020-06-02 plugin id 42988 published 2009-12-03 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/42988 title Fedora 12 : wget-1.12-2.fc12 (2009-11836) NASL family Solaris Local Security Checks NASL id SOLARIS10_125215-04.NASL description SunOS 5.10: wget patch. Date this patch was last updated by Sun : Apr/15/11 last seen 2020-06-01 modified 2020-06-02 plugin id 107420 published 2018-03-12 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/107420 title Solaris 10 (sparc) : 125215-04 NASL family Solaris Local Security Checks NASL id SOLARIS10_125215-08.NASL description SunOS 5.10: wget patch. Date this patch was last updated by Sun : Oct/14/19 last seen 2020-06-01 modified 2020-06-02 plugin id 129871 published 2019-10-15 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/129871 title Solaris 10 (sparc) : 125215-08 NASL family Mandriva Local Security Checks NASL id MANDRIVA_MDVSA-2009-206.NASL description A vulnerability has been found and corrected in wget : GNU Wget before 1.12 does not properly handle a last seen 2020-06-01 modified 2020-06-02 plugin id 40638 published 2009-08-20 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/40638 title Mandriva Linux Security Advisory : wget (MDVSA-2009:206-1) NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_125216-04.NASL description SunOS 5.10_x86: wget patch. Date this patch was last updated by Sun : Apr/15/11 last seen 2020-06-01 modified 2020-06-02 plugin id 107922 published 2018-03-12 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/107922 title Solaris 10 (x86) : 125216-04 NASL family Fedora Local Security Checks NASL id FEDORA_2009-11739.NASL description - Wed Nov 18 2009 Karsten Hopp <karsten at redhat.com> 1.12-2 - don last seen 2020-06-01 modified 2020-06-02 plugin id 42986 published 2009-12-03 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/42986 title Fedora 10 : wget-1.12-2.fc10 (2009-11739) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1904.NASL description Daniel Stenberg discovered that wget, a network utility to retrieve files from the Web using HTTP(S) and FTP, is vulnerable to the last seen 2020-06-01 modified 2020-06-02 plugin id 44769 published 2010-02-24 reporter This script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/44769 title Debian DSA-1904-1 : wget - insufficient input validation NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2009-1549.NASL description From Red Hat Security Advisory 2009:1549 : An updated wget package that fixes a security issue is now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. GNU Wget is a file retrieval utility that can use HTTP, HTTPS, and FTP. Daniel Stenberg reported that Wget is affected by the previously published last seen 2020-06-01 modified 2020-06-02 plugin id 67954 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67954 title Oracle Linux 3 / 4 / 5 : wget (ELSA-2009-1549) NASL family Solaris Local Security Checks NASL id SOLARIS10_125215.NASL description SunOS 5.10: wget patch. Date this patch was last updated by Sun : Sep/15/16 This plugin has been deprecated and either replaced with individual 125215 patch-revision plugins, or deemed non-security related. last seen 2019-02-21 modified 2018-07-30 plugin id 42970 published 2009-12-02 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=42970 title Solaris 10 (sparc) : 125215-07 (deprecated) NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_125216-08.NASL description SunOS 5.10_x86: wget patch. Date this patch was last updated by Sun : Oct/14/19 last seen 2020-06-01 modified 2020-06-02 plugin id 129875 published 2019-10-15 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/129875 title Solaris 10 (x86) : 125216-08 NASL family Solaris Local Security Checks NASL id SOLARIS10_125215-07.NASL description SunOS 5.10: wget patch. Date this patch was last updated by Sun : Sep/15/16 last seen 2020-06-01 modified 2020-06-02 plugin id 107422 published 2018-03-12 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/107422 title Solaris 10 (sparc) : 125215-07 NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_125216-05.NASL description SunOS 5.10_x86: wget patch. Date this patch was last updated by Sun : Jan/19/15 last seen 2020-06-01 modified 2020-06-02 plugin id 107923 published 2018-03-12 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/107923 title Solaris 10 (x86) : 125216-05 NASL family Fedora Local Security Checks NASL id FEDORA_2009-11740.NASL description - Wed Nov 18 2009 Karsten Hopp <karsten at redhat.com> 1.12-2 - don last seen 2020-06-01 modified 2020-06-02 plugin id 42987 published 2009-12-03 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/42987 title Fedora 11 : wget-1.12-2.fc11 (2009-11740) NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_125216.NASL description SunOS 5.10_x86: wget patch. Date this patch was last updated by Sun : Sep/15/16 This plugin has been deprecated and either replaced with individual 125216 patch-revision plugins, or deemed non-security related. last seen 2019-02-21 modified 2018-07-30 plugin id 42971 published 2009-12-02 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=42971 title Solaris 10 (x86) : 125216-07 (deprecated) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2009-1549.NASL description An updated wget package that fixes a security issue is now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. GNU Wget is a file retrieval utility that can use HTTP, HTTPS, and FTP. Daniel Stenberg reported that Wget is affected by the previously published last seen 2020-06-01 modified 2020-06-02 plugin id 42359 published 2009-11-04 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/42359 title RHEL 3 / 4 / 5 : wget (RHSA-2009:1549) NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_125216-07.NASL description SunOS 5.10_x86: wget patch. Date this patch was last updated by Sun : Sep/15/16 last seen 2020-06-01 modified 2020-06-02 plugin id 107924 published 2018-03-12 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/107924 title Solaris 10 (x86) : 125216-07 NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-842-1.NASL description It was discovered that Wget did not correctly handle SSL certificates with zero bytes in the Common Name. A remote attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 42050 published 2009-10-07 reporter Ubuntu Security Notice (C) 2009-2019 Canonical, Inc. / NASL script (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/42050 title Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : wget vulnerability (USN-842-1)
Oval
accepted | 2013-04-29T04:11:30.659-04:00 | ||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||
description | GNU Wget before 1.12 does not properly handle a '\0' character in a domain name in the Common Name field of an X.509 certificate, which allows man-in-the-middle remote attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. | ||||||||||||||||||||||||||||||||
family | unix | ||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:11099 | ||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||
submitted | 2010-07-09T03:56:16-04:00 | ||||||||||||||||||||||||||||||||
title | GNU Wget before 1.12 does not properly handle a '\0' character in a domain name in the Common Name field of an X.509 certificate, which allows man-in-the-middle remote attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. | ||||||||||||||||||||||||||||||||
version | 27 |
Redhat
advisories |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
rpms |
|
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 36205 CVE(CAN) ID: CVE-2009-3490 Wget是可使用HTTP、HTTPS和FTP协议的文件检索工具。 Wget没有正确地处理X.509证书主题通用名称(CN)字段域名中的空字符(\0),在处理包含有空字符的证书字段时错误地将空字符处理为截止字符,因此只会验证空字符前的部分。例如,对于类似于以下的名称: example.com\0.haxx.se 证书是发布给haxx.se的,但Wget错误的验证给example.com,这有助于攻击者通过中间人攻击执行网络钓鱼等欺骗。 Micah Cowan Wget < 1.12 厂商补丁: RedHat ------ RedHat已经为此发布了一个安全公告(RHSA-2009:1549-01)以及相应补丁: RHSA-2009:1549-01:Moderate: wget security update 链接:https://www.redhat.com/support/errata/RHSA-2009-1549.html Micah Cowan ----------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://hg.addictivecode.org/wget/mainline/rev/1eab157d3be7 |
id | SSV:12579 |
last seen | 2017-11-19 |
modified | 2009-11-05 |
published | 2009-11-05 |
reporter | Root |
title | Wget CA SSL畸形证书验证漏洞 |
References
- http://addictivecode.org/pipermail/wget-notify/2009-August/001808.html
- http://addictivecode.org/pipermail/wget-notify/2009-August/001808.html
- http://hg.addictivecode.org/wget/mainline/rev/1eab157d3be7
- http://hg.addictivecode.org/wget/mainline/rev/1eab157d3be7
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://marc.info/?l=oss-security&m=125198917018936&w=2
- http://marc.info/?l=oss-security&m=125198917018936&w=2
- http://marc.info/?l=oss-security&m=125369675820512&w=2
- http://marc.info/?l=oss-security&m=125369675820512&w=2
- http://permalink.gmane.org/gmane.comp.web.wget.general/8972
- http://permalink.gmane.org/gmane.comp.web.wget.general/8972
- http://secunia.com/advisories/36540
- http://secunia.com/advisories/36540
- http://www.securityfocus.com/bid/36205
- http://www.securityfocus.com/bid/36205
- http://www.vupen.com/english/advisories/2009/2498
- http://www.vupen.com/english/advisories/2009/2498
- https://bugzilla.redhat.com/show_bug.cgi?id=520454
- https://bugzilla.redhat.com/show_bug.cgi?id=520454
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11099
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11099