[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 82-1] wget security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : wget
Version        : 1.12-2.1+deb6u1
CVE ID         : CVE-2014-4877

HD Moore of Rapid7 discovered a symlink attack in Wget, a command-line
utility to retrieve files via HTTP, HTTPS, and FTP. The vulnerability
allows to create arbitrary files on the user's system when Wget runs in
recursive mode against a malicious FTP server. Arbitrary file creation
may override content of user's files or permit remote code execution with
the user privilege.

This update changes the default setting in Wget such that it no longer
creates local symbolic links, but rather traverses them and retrieves the
pointed-to file in such a retrieval.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=f9Ax
-----END PGP SIGNATURE-----


Reply to: