Description: | Description:
The remote host is missing updates announced in advisory RHSA-2005:771.
GNU Wget is a file retrieval utility that can use either the HTTP or FTP protocols.
A bug was found in the way wget writes files to the local disk. If a malicious local user has write access to the directory wget is saving a file into, it is possible to overwrite files that the user running wget has write access to. (CVE-2004-2014)
A bug was found in the way wget filters redirection URLs. It is possible for a malicious Web server to overwrite files the user running wget has write access to. Note: in order for this attack to succeed the local DNS would need to resolve .. to an IP address, which is an unlikely situation. (CVE-2004-1487)
A bug was found in the way wget displays HTTP response codes. It is possible that a malicious web server could inject a specially crafted terminal escape sequence capable of misleading the user running wget. (CVE-2004-1488)
Users should upgrade to this updated package, which contains a version of wget that is not vulnerable to these issues.
Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date
http://rhn.redhat.com/errata/RHSA-2005-771.html
Risk factor : Medium
CVSS Score: 5.0
|