Debians sikkerhedsbulletin

DSA-209-1 wget -- mappegennemløb

Rapporteret den:
12. dec 2002
Berørte pakker:
wget
Sårbar:
Ja
Referencer i sikkerhedsdatabaser:
I Bugtraq-databasen (hos SecurityFocus): BugTraq-id 6352.
I Mitres CVE-ordbog: CVE-2002-1344, CVE-2002-1565.
Yderligere oplysninger:

Der er fundet to problemer i pakken wget som distribueres med Debian GNU/Linux:

  • Stefano Zacchiroli har fundet et bufferoverløb i funktionen url_filename, der kunne få wget til at gå ned med en segfault ved meget lange URL'er.
  • Steven M. Christey har opdaget at wget ikke kontrollerede FTP-serversvar på en NLST-kommando: den må ikke indeholder mappeoplysninger, da disse kan bruges til at få en FTP-klient til at overskrive vilkårlige filer.

Begge problems er rettet i version 1.5.3-3.1 i Debian GNU/Linux 2.2/potato og version 1.8.1-6.1 i Debian GNU/Linux 3.0/woody.

Rettet i:

Debian GNU/Linux 2.2 (potato)

Kildekode:
http://security.debian.org/pool/updates/main/w/wget/wget_1.5.3-3.1.diff.gz
http://security.debian.org/pool/updates/main/w/wget/wget_1.5.3.orig.tar.gz
http://security.debian.org/pool/updates/main/w/wget/wget_1.5.3-3.1.dsc
alpha (DEC Alpha):
http://security.debian.org/pool/updates/main/w/wget/wget_1.5.3-3.1_alpha.deb
arm (ARM):
http://security.debian.org/pool/updates/main/w/wget/wget_1.5.3-3.1_arm.deb
i386 (Intel ia32):
http://security.debian.org/pool/updates/main/w/wget/wget_1.5.3-3.1_i386.deb
m68k (Motorola Mc680x0):
http://security.debian.org/pool/updates/main/w/wget/wget_1.5.3-3.1_m68k.deb
powerpc (PowerPC):
http://security.debian.org/pool/updates/main/w/wget/wget_1.5.3-3.1_powerpc.deb
sparc (Sun SPARC/UltraSPARC):
http://security.debian.org/pool/updates/main/w/wget/wget_1.5.3-3.1_sparc.deb

Debian GNU/Linux 3.0 (woody)

Kildekode:
http://security.debian.org/pool/updates/main/w/wget/wget_1.8.1.orig.tar.gz
http://security.debian.org/pool/updates/main/w/wget/wget_1.8.1-6.1.diff.gz
http://security.debian.org/pool/updates/main/w/wget/wget_1.8.1-6.1.dsc
alpha (DEC Alpha):
http://security.debian.org/pool/updates/main/w/wget/wget_1.8.1-6.1_alpha.deb
arm (ARM):
http://security.debian.org/pool/updates/main/w/wget/wget_1.8.1-6.1_arm.deb
hppa (HP PA RISC):
http://security.debian.org/pool/updates/main/w/wget/wget_1.8.1-6.1_hppa.deb
i386 (Intel ia32):
http://security.debian.org/pool/updates/main/w/wget/wget_1.8.1-6.1_i386.deb
ia64 (Intel ia64):
http://security.debian.org/pool/updates/main/w/wget/wget_1.8.1-6.1_ia64.deb
m68k (Motorola Mc680x0):
http://security.debian.org/pool/updates/main/w/wget/wget_1.8.1-6.1_m68k.deb
mips (MIPS (Big Endian)):
http://security.debian.org/pool/updates/main/w/wget/wget_1.8.1-6.1_mips.deb
powerpc (PowerPC):
http://security.debian.org/pool/updates/main/w/wget/wget_1.8.1-6.1_powerpc.deb
s390 (IBM S/390):
http://security.debian.org/pool/updates/main/w/wget/wget_1.8.1-6.1_s390.deb
sparc (Sun SPARC/UltraSPARC):
http://security.debian.org/pool/updates/main/w/wget/wget_1.8.1-6.1_sparc.deb

MD5-kontrolsummer for de listede filer findes i den originale sikkerhedsbulletin.