Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.53869
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-145-1 (wget)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to wget
announced via advisory USN-145-1.

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)

The following packages are affected: wget

Jan Minar discovered a path traversal vulnerability in wget. If the
name .. was a valid host name (which can be achieved with a
malicious or poisoned domain name server), it was possible to trick
wget into creating downloaded files into arbitrary locations with
arbitrary names. For example, wget could silently overwrite the users
~
/.bashrc and other configuration files which are executed
automatically. (CVE-2004-1487)

Jan Minar also discovered that wget printed HTTP response strings from
the server to the terminal without any filtering. Malicious HTTP
servers could exploit this to send arbitrary terminal sequences and
strings which would then be executed and printed to the console. This
could potentially lead to arbitrary code execution with the privileges
of the user invoking wget. (CVE-2004-1488)

Hugo Vazquez Caramés discovered a race condition when writing output
files. After wget determined the output file name, but before the file
was actually opened (the time window is determined by the delay of the
first received data packet), a local attacker with with write
permission to the download directory could create a symbolic link with
the name of the output file. This could be exploited to overwrite
arbitrary files with the permissions of the user invoking wget.
(CVE-2004-2014)

Solution:
The problem can be corrected by upgrading the affected package to
version 1.9.1-4ubuntu0.1 (for Ubuntu 4.10), or 1.9.1-10ubuntu2.1 (for
Ubuntu 5.04). In general, a standard system upgrade is sufficient to
effect the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-145-1

Risk factor : Medium

CVSS Score:
5.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-1487
BugTraq ID: 11871
http://www.securityfocus.com/bid/11871
Bugtraq: 20041209 wget: Arbitrary file overwriting/appending/creating and other vulnerabilities (Google Search)
http://marc.info/?l=bugtraq&m=110269474112384&w=2
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261755
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11682
http://www.redhat.com/support/errata/RHSA-2005-771.html
http://securitytracker.com/id?1012472
https://usn.ubuntu.com/145-1/
XForce ISS Database: wget-file-overwrite(18420)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18420
Common Vulnerability Exposure (CVE) ID: CVE-2004-1488
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9750
http://secunia.com/advisories/20960
SuSE Security Announcement: SUSE-SR:2006:016 (Google Search)
http://www.novell.com/linux/security/advisories/2006_16_sr.html
XForce ISS Database: wget-terminal-overwrite(18421)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18421
Common Vulnerability Exposure (CVE) ID: CVE-2004-2014
BugTraq ID: 10361
http://www.securityfocus.com/bid/10361
Bugtraq: 20040516 Wget race condition vulnerability (Google Search)
http://marc.info/?l=bugtraq&m=108481268725276&w=2
http://www.mandriva.com/security/advisories?name=MDKSA-2005:204
http://marc.info/?l=wget&m=108483270227139&w=2
http://marc.info/?l=wget&m=108482747906833&w=2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9830
http://secunia.com/advisories/17399
XForce ISS Database: wget-lock-race-condition(16167)
https://exchange.xforce.ibmcloud.com/vulnerabilities/16167
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.