Login
Newsletter
Werbung

Sicherheit: Überschreiben von Dateien in Wget
Aktuelle Meldungen Distributionen
Name: Überschreiben von Dateien in Wget
ID: USN-2393-1
Distribution: Ubuntu
Plattformen: Ubuntu 10.04 LTS, Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 14.10
Datum: Fr, 31. Oktober 2014, 08:48
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877
Applikationen: Wget

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============0224964137334904438==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="owUETxJfn0iq8qIK9suCaDeAfnJQ7H5Om"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--owUETxJfn0iq8qIK9suCaDeAfnJQ7H5Om
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-2393-1
October 30, 2014

wget vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS

Summary:

Wget could be made to overwrite files.

Software Description:
- wget: retrieves files from the web

Details:

HD Moore discovered that Wget contained a path traversal vulnerability
when downloading symlinks using FTP. A malicious remote FTP server or a man
in the middle could use this issue to cause Wget to overwrite arbitrary
files, possibly leading to arbitrary code execution.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.10:
wget 1.15-1ubuntu1.14.10.1

Ubuntu 14.04 LTS:
wget 1.15-1ubuntu1.14.04.1

Ubuntu 12.04 LTS:
wget 1.13.4-2ubuntu1.2

Ubuntu 10.04 LTS:
wget 1.12-1.1ubuntu2.2

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2393-1
CVE-2014-4877

Package Information:
https://launchpad.net/ubuntu/+source/wget/1.15-1ubuntu1.14.10.1
https://launchpad.net/ubuntu/+source/wget/1.15-1ubuntu1.14.04.1
https://launchpad.net/ubuntu/+source/wget/1.13.4-2ubuntu1.2
https://launchpad.net/ubuntu/+source/wget/1.12-1.1ubuntu2.2



--owUETxJfn0iq8qIK9suCaDeAfnJQ7H5Om
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=xfHG
-----END PGP SIGNATURE-----

--owUETxJfn0iq8qIK9suCaDeAfnJQ7H5Om--


--===============0224964137334904438==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============0224964137334904438==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung