Skip to navigation

Security Advisory Moderate: wget security update

Advisory: RHSA-2009:1549-1
Type: Security Advisory
Severity: Moderate
Issued on: 2009-11-03
Last updated on: 2009-11-03
Affected Products: Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.8.z)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.8.z)
Red Hat Enterprise Linux EUS (v. 5.4.z server)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2009-3490

Details

An updated wget package that fixes a security issue is now available for
Red Hat Enterprise Linux 3, 4, and 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

GNU Wget is a file retrieval utility that can use HTTP, HTTPS, and FTP.

Daniel Stenberg reported that Wget is affected by the previously published
"null prefix attack", caused by incorrect handling of NULL characters in
X.509 certificates. If an attacker is able to get a carefully-crafted
certificate signed by a trusted Certificate Authority, the attacker could
use the certificate during a man-in-the-middle attack and potentially
confuse Wget into accepting it by mistake. (CVE-2009-3490)

Wget users should upgrade to this updated package, which contains a
backported patch to correct this issue.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Desktop (v. 3)

SRPMS:
wget-1.10.2-0.30E.1.src.rpm     MD5: 0a8384308adc141060f3e02d8783385f
 
IA-32:
wget-1.10.2-0.30E.1.i386.rpm     MD5: 3200e66bda948aa768cdd0046c8dbd41
 
x86_64:
wget-1.10.2-0.30E.1.x86_64.rpm     MD5: 333b7d14559b7f3d3838d10724b0b098
 
Red Hat Desktop (v. 4)

SRPMS:
wget-1.10.2-1.el4_8.1.src.rpm     MD5: 7772d92e37f2c7ce3edc6d28f66a6497
 
IA-32:
wget-1.10.2-1.el4_8.1.i386.rpm     MD5: 703ac29ddf02c33acf64a535faccf18d
 
x86_64:
wget-1.10.2-1.el4_8.1.x86_64.rpm     MD5: 4285136df6b72983a28aca1f0727a24e
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
wget-1.11.4-2.el5_4.1.src.rpm
File outdated by:  RHBA-2012:0560
    MD5: cef1c83bc22b4cdb5031fb08d076d77a
 
IA-32:
wget-1.11.4-2.el5_4.1.i386.rpm
File outdated by:  RHBA-2012:0560
    MD5: 8dcc5ca2b5e045dffbe9f97142a84db7
 
IA-64:
wget-1.11.4-2.el5_4.1.ia64.rpm
File outdated by:  RHBA-2012:0560
    MD5: ce83ecb50e470d56fc30942251494b1e
 
PPC:
wget-1.11.4-2.el5_4.1.ppc.rpm
File outdated by:  RHBA-2012:0560
    MD5: c7506ea6896201be6ef0e5de5a5fae0a
 
s390x:
wget-1.11.4-2.el5_4.1.s390x.rpm
File outdated by:  RHBA-2012:0560
    MD5: a6e9003c2a39b999c981007b82633795
 
x86_64:
wget-1.11.4-2.el5_4.1.x86_64.rpm
File outdated by:  RHBA-2012:0560
    MD5: aa4d510f4e7a3c6c1307d7c1ea0e4103
 
Red Hat Enterprise Linux AS (v. 3)

SRPMS:
wget-1.10.2-0.30E.1.src.rpm     MD5: 0a8384308adc141060f3e02d8783385f
 
IA-32:
wget-1.10.2-0.30E.1.i386.rpm     MD5: 3200e66bda948aa768cdd0046c8dbd41
 
IA-64:
wget-1.10.2-0.30E.1.ia64.rpm     MD5: 46b9561898aaa9dc84ebe8a0328adf9f
 
PPC:
wget-1.10.2-0.30E.1.ppc.rpm     MD5: ab080a22ceaeee003cfa471225789f37
 
s390:
wget-1.10.2-0.30E.1.s390.rpm     MD5: 0e99386f08914eb7184be753b193cf98
 
s390x:
wget-1.10.2-0.30E.1.s390x.rpm     MD5: 82edeca332b54abf541ef26125d296b1
 
x86_64:
wget-1.10.2-0.30E.1.x86_64.rpm     MD5: 333b7d14559b7f3d3838d10724b0b098
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
wget-1.10.2-1.el4_8.1.src.rpm     MD5: 7772d92e37f2c7ce3edc6d28f66a6497
 
IA-32:
wget-1.10.2-1.el4_8.1.i386.rpm     MD5: 703ac29ddf02c33acf64a535faccf18d
 
IA-64:
wget-1.10.2-1.el4_8.1.ia64.rpm     MD5: 15bea7fd771b7ca4364428db6db2bd60
 
PPC:
wget-1.10.2-1.el4_8.1.ppc.rpm     MD5: 4eca203d2c52b3c6e6429774e5016937
 
s390:
wget-1.10.2-1.el4_8.1.s390.rpm     MD5: 79e8cd99df5564c887ce1b29e5ebe852
 
s390x:
wget-1.10.2-1.el4_8.1.s390x.rpm     MD5: 1271f4e804529ce0fb14d41760e93ea8
 
x86_64:
wget-1.10.2-1.el4_8.1.x86_64.rpm     MD5: 4285136df6b72983a28aca1f0727a24e
 
Red Hat Enterprise Linux AS (v. 4.8.z)

SRPMS:
wget-1.10.2-1.el4_8.1.src.rpm     MD5: 7772d92e37f2c7ce3edc6d28f66a6497
 
IA-32:
wget-1.10.2-1.el4_8.1.i386.rpm     MD5: 703ac29ddf02c33acf64a535faccf18d
 
IA-64:
wget-1.10.2-1.el4_8.1.ia64.rpm     MD5: 15bea7fd771b7ca4364428db6db2bd60
 
PPC:
wget-1.10.2-1.el4_8.1.ppc.rpm     MD5: 4eca203d2c52b3c6e6429774e5016937
 
s390:
wget-1.10.2-1.el4_8.1.s390.rpm     MD5: 79e8cd99df5564c887ce1b29e5ebe852
 
s390x:
wget-1.10.2-1.el4_8.1.s390x.rpm     MD5: 1271f4e804529ce0fb14d41760e93ea8
 
x86_64:
wget-1.10.2-1.el4_8.1.x86_64.rpm     MD5: 4285136df6b72983a28aca1f0727a24e
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
wget-1.11.4-2.el5_4.1.src.rpm
File outdated by:  RHBA-2012:0560
    MD5: cef1c83bc22b4cdb5031fb08d076d77a
 
IA-32:
wget-1.11.4-2.el5_4.1.i386.rpm
File outdated by:  RHBA-2012:0560
    MD5: 8dcc5ca2b5e045dffbe9f97142a84db7
 
x86_64:
wget-1.11.4-2.el5_4.1.x86_64.rpm
File outdated by:  RHBA-2012:0560
    MD5: aa4d510f4e7a3c6c1307d7c1ea0e4103
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
wget-1.10.2-0.30E.1.src.rpm     MD5: 0a8384308adc141060f3e02d8783385f
 
IA-32:
wget-1.10.2-0.30E.1.i386.rpm     MD5: 3200e66bda948aa768cdd0046c8dbd41
 
IA-64:
wget-1.10.2-0.30E.1.ia64.rpm     MD5: 46b9561898aaa9dc84ebe8a0328adf9f
 
x86_64:
wget-1.10.2-0.30E.1.x86_64.rpm     MD5: 333b7d14559b7f3d3838d10724b0b098
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
wget-1.10.2-1.el4_8.1.src.rpm     MD5: 7772d92e37f2c7ce3edc6d28f66a6497
 
IA-32:
wget-1.10.2-1.el4_8.1.i386.rpm     MD5: 703ac29ddf02c33acf64a535faccf18d
 
IA-64:
wget-1.10.2-1.el4_8.1.ia64.rpm     MD5: 15bea7fd771b7ca4364428db6db2bd60
 
x86_64:
wget-1.10.2-1.el4_8.1.x86_64.rpm     MD5: 4285136df6b72983a28aca1f0727a24e
 
Red Hat Enterprise Linux ES (v. 4.8.z)

SRPMS:
wget-1.10.2-1.el4_8.1.src.rpm     MD5: 7772d92e37f2c7ce3edc6d28f66a6497
 
IA-32:
wget-1.10.2-1.el4_8.1.i386.rpm     MD5: 703ac29ddf02c33acf64a535faccf18d
 
IA-64:
wget-1.10.2-1.el4_8.1.ia64.rpm     MD5: 15bea7fd771b7ca4364428db6db2bd60
 
x86_64:
wget-1.10.2-1.el4_8.1.x86_64.rpm     MD5: 4285136df6b72983a28aca1f0727a24e
 
Red Hat Enterprise Linux EUS (v. 5.4.z server)

SRPMS:
wget-1.11.4-2.el5_4.1.src.rpm
File outdated by:  RHBA-2012:0560
    MD5: cef1c83bc22b4cdb5031fb08d076d77a
 
IA-32:
wget-1.11.4-2.el5_4.1.i386.rpm     MD5: 8dcc5ca2b5e045dffbe9f97142a84db7
 
IA-64:
wget-1.11.4-2.el5_4.1.ia64.rpm     MD5: ce83ecb50e470d56fc30942251494b1e
 
PPC:
wget-1.11.4-2.el5_4.1.ppc.rpm     MD5: c7506ea6896201be6ef0e5de5a5fae0a
 
s390x:
wget-1.11.4-2.el5_4.1.s390x.rpm     MD5: a6e9003c2a39b999c981007b82633795
 
x86_64:
wget-1.11.4-2.el5_4.1.x86_64.rpm     MD5: aa4d510f4e7a3c6c1307d7c1ea0e4103
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
wget-1.10.2-0.30E.1.src.rpm     MD5: 0a8384308adc141060f3e02d8783385f
 
IA-32:
wget-1.10.2-0.30E.1.i386.rpm     MD5: 3200e66bda948aa768cdd0046c8dbd41
 
IA-64:
wget-1.10.2-0.30E.1.ia64.rpm     MD5: 46b9561898aaa9dc84ebe8a0328adf9f
 
x86_64:
wget-1.10.2-0.30E.1.x86_64.rpm     MD5: 333b7d14559b7f3d3838d10724b0b098
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
wget-1.10.2-1.el4_8.1.src.rpm     MD5: 7772d92e37f2c7ce3edc6d28f66a6497
 
IA-32:
wget-1.10.2-1.el4_8.1.i386.rpm     MD5: 703ac29ddf02c33acf64a535faccf18d
 
IA-64:
wget-1.10.2-1.el4_8.1.ia64.rpm     MD5: 15bea7fd771b7ca4364428db6db2bd60
 
x86_64:
wget-1.10.2-1.el4_8.1.x86_64.rpm     MD5: 4285136df6b72983a28aca1f0727a24e
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

520454 - CVE-2009-3490 wget: incorrect verification of SSL certificate with NUL in name


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/