Synopsis
The remote host is missing a vendor-supplied security patch
Description
The remote host is missing the patch for the advisory SUSE-SA:2005:063 (curl, wget).
This update fixes a stack-based buffer overflow in the NTLM authentication code used by the file download tools/libraries curl and wget that can be triggered by using a long user or domain name (also works with HTTP redirects).
By exploiting this bug by using a malicious server an attacker may be able to execute arbitrary code with the privileges of the entity running the process locally. (CVE-2005-3185)
This affects both curl/libcurl and wget >= 1.10. wget copied the code from libcurl, making this effectively the same problem.
Solution
http://www.suse.de/security/advisories/2005_63_wget_curl.html
Plugin Details
File Name: suse_SA_2005_063.nasl
Agent: unix
Supported Sensors: Continuous Assessment, Nessus Agent, Nessus
Vulnerability Information
Required KB Items: Host/SuSE/rpm-list