[USN-2393-1] Wget vulnerability

Marc Deslauriers marc.deslauriers at canonical.com
Thu Oct 30 17:41:15 UTC 2014

Ubuntu Security Notice USN-2393-1
October 30, 2014

wget vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS


Wget could be made to overwrite files.

Software Description:
- wget: retrieves files from the web


HD Moore discovered that Wget contained a path traversal vulnerability
when downloading symlinks using FTP. A malicious remote FTP server or a man
in the middle could use this issue to cause Wget to overwrite arbitrary
files, possibly leading to arbitrary code execution.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.10:
  wget                            1.15-1ubuntu1.14.10.1

Ubuntu 14.04 LTS:
  wget                            1.15-1ubuntu1.14.04.1

Ubuntu 12.04 LTS:
  wget                            1.13.4-2ubuntu1.2

Ubuntu 10.04 LTS:
  wget                            1.12-1.1ubuntu2.2

In general, a standard system update will make all the necessary changes.


Package Information:

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20141030/7ce41128/attachment.sig>

More information about the ubuntu-security-announce mailing list