Mangelnde Eingabeprüfung in Wget (Aktualisierung)
ID: | USN-3643-2 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 12.04 ESM |
Datum: | Mi, 9. Mai 2018, 19:29 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0494 |
Applikationen: | Wget |
Update von: | Mangelnde Eingabeprüfung in Wget |
Originalnachricht |
|
--===============3406514912764709318== Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="=-vvk5P+Pvusa3cB7u9Z51" --=-vvk5P+Pvusa3cB7u9Z51 Content-Type: text/plain; charset="UTF-8 Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-3643-2 May 09, 2018 wget vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 ESM Summary: Wget could be made to inject arbitrary cookie values. Software Description: - wget: retrieves files from the web Details: USN-3643-1 fixed a vulnerability in Wget. This update provides the corresponding update for Ubuntu 12.04 ESM. Original advisory details: It was discovered that Wget incorrectly handled certain inputs. An attacker could possibly use this to inject arbitrary cookie values. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 ESM: wget 1.13.4-2ubuntu1.6 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/usn/usn-3643-2 https://usn.ubuntu.com/usn/usn-3643-1 CVE-2018-0494 --=-vvk5P+Pvusa3cB7u9Z51 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAABCAAGBQJa8xk2AAoJEEW851uECx9pUWwQAIf5+yegfk9KBzZthDHhHrLk V3JRjmc8e+yITgDl2docvJb91zq/1P3AnpaY0/LL1uQBsTJn8JP1/xULPHNJCmaA j6D9LepOxJNVPebh+RSAZMxBUMB3AWy0XPsvX0L6+XQc/eLH/DbfqmHKkhmCDL8o l8UXgrF6Ir1ERBsGajcHEpoIg/FzqxT+VeFlJ6YvtoH7TgphaqfkfzN7ArTP41Y9 1hxjImUoi0WuWpcYgyBbgkCLjaw4yuzh4ts7pBz0zzE5ZYJSeztki3V6dsTa7bTX gfR/8g6jNnuTURPY0IeX/1w598PleL5EN/HabJmUNE0+jBwWbSFKMoaCBPna54G8 XTYpP6Af6Ai4i8yTUaaYeXZVdgMrdb3outVqDeJtQrkVt+1AEiOKyvTZaiKhfdSp pemghybmt5au/1Rko8hjC6cEEKCkOY55+XBrjuNpMOjHIiv4A6HW1f7O2M97iiXz j42/Jo5XTLUGyIbT+5YBjqDL5X0tD5em0a2/nmuClQFbbwGzfq72s2Qo5/nIcLbV 13feXFNM3rHb6GHWQ/6C/5jkUvff8LkbPgkVXVhBlbHzX3H9tbx2CnUJtZkrkMxY wfCoAVu30qRZwrMN30pgQ2RSltqD3ROOX46Y+Y+T1k7HBGy8uE4XmbkTP+RXghBa IEZT9N79e06UhBWeHNlu =6qcB -----END PGP SIGNATURE----- --=-vvk5P+Pvusa3cB7u9Z51-- --===============3406514912764709318== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK --===============3406514912764709318==-- |