SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   wget Vendors:   GNU [multiple authors]
(Ubuntu Issues Fix) wget Default FTP Retrieval Method Lets Remote Users Create Arbitrary Files and Directories
SecurityTracker Alert ID:  1031146
SecurityTracker URL:  http://securitytracker.com/id/1031146
CVE Reference:   CVE-2014-4877   (Links to External Site)
Date:  Oct 31 2014
Impact:   Modification of system information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 1.16
Description:   A vulnerability was reported in wget. A remote user can cause arbitrary files, directories, and symlinks to be created on the target user's system.

A remote user can create a specially crafted directory that, when recursively retrieved via FTP, will create arbitrary files, directories, or symbolic links on the target user's system with the permissions specified on the remote system.

HD Moore of Rapid7 reported this vulnerability.

Impact:   A remote user can cause arbitrary files, directories, and symlinks to be created on the target user's system.
Solution:   Ubuntu has issued a fix.

The Ubuntu advisory is available at:

http://www.ubuntu.com/usn/usn-2393-1

Vendor URL:  lists.gnu.org/archive/html/bug-wget/2014-10/msg00150.html (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Ubuntu)
Underlying OS Comments:  10.04 LTS, 12.04 LTS, 14.04 LTS, 14.10

Message History:   This archive entry is a follow-up to the message listed below.
Oct 28 2014 wget Default FTP Retrieval Method Lets Remote Users Create Arbitrary Files and Directories



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC