Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Ubuntu Local Security Checks --> Category: infos

USN145-1 : wget vulnerabilities Vulnerability Scan

Vulnerability Scan Summary
wget vulnerabilities

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote package "wget" is missing a security patch.

Description :

Jan Minar discovered a path traversal vulnerability in wget. If the
name ".." was a valid host name (which can be achieved with a
malicious or poisoned domain name server), it was possible to trick
wget into creating downloaded files into arbitrary locations with
arbitrary names. For example, wget could silently overwrite the users
~/.bashrc and other configuration files which are executed
automatically. (CVE-2004-1487)

Jan Minar also discovered that wget printed HTTP response strings from
the server to the terminal without any filtering. Malicious HTTP
servers could exploit this to send arbitrary terminal sequences and
strings which would then be executed and printed to the console. This
could potentially lead to arbitrary code execution with the rights
of the user invoking wget. (CVE-2004-1488)

Hugo Vázquez Caramés discovered a race condition when writing output
files. After wget acertaind the output file name, but before the file
was actually opened (the time window is acertaind by the delay of th

Solution :

Upgrade to :
- wget-1.9.1-10ubuntu2.1 (Ubuntu 5.04)

Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.