[USN-2393-1] Wget vulnerability
Marc Deslauriers
marc.deslauriers at canonical.com
Thu Oct 30 17:41:15 UTC 2014
==========================================================================
Ubuntu Security Notice USN-2393-1
October 30, 2014
wget vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
Wget could be made to overwrite files.
Software Description:
- wget: retrieves files from the web
Details:
HD Moore discovered that Wget contained a path traversal vulnerability
when downloading symlinks using FTP. A malicious remote FTP server or a man
in the middle could use this issue to cause Wget to overwrite arbitrary
files, possibly leading to arbitrary code execution.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.10:
wget 1.15-1ubuntu1.14.10.1
Ubuntu 14.04 LTS:
wget 1.15-1ubuntu1.14.04.1
Ubuntu 12.04 LTS:
wget 1.13.4-2ubuntu1.2
Ubuntu 10.04 LTS:
wget 1.12-1.1ubuntu2.2
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2393-1
CVE-2014-4877
Package Information:
https://launchpad.net/ubuntu/+source/wget/1.15-1ubuntu1.14.10.1
https://launchpad.net/ubuntu/+source/wget/1.15-1ubuntu1.14.04.1
https://launchpad.net/ubuntu/+source/wget/1.13.4-2ubuntu1.2
https://launchpad.net/ubuntu/+source/wget/1.12-1.1ubuntu2.2
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20141030/7ce41128/attachment.sig>
More information about the ubuntu-security-announce
mailing list