|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Ubuntu Local Security Checks >> USN145-1 : wget vulnerabilities Vulnerability Assessment Details
|
USN145-1 : wget vulnerabilities |
||
wget vulnerabilities Detailed Explanation for this Vulnerability Assessment Summary : The remote package "wget" is missing a security patch. Description : Jan Minar discovered a path traversal vulnerability in wget. If the name ".." was a valid host name (which can be achieved with a malicious or poisoned domain name server), it was possible to trick wget into creating downloaded files into arbitrary locations with arbitrary names. For example, wget could silently overwrite the users ~/.bashrc and other configuration files which are executed automatically. (CVE-2004-1487) Jan Minar also discovered that wget printed HTTP response strings from the server to the terminal without any filtering. Malicious HTTP servers could exploit this to send arbitrary terminal sequences and strings which would then be executed and printed to the console. This could potentially lead to arbitrary code execution with the rights of the user invoking wget. (CVE-2004-1488) Hugo Vázquez Caramés discovered a race condition when writing output files. After wget acertaind the output file name, but before the file was actually opened (the time window is acertaind by the delay of th [...] Solution : Upgrade to : - wget-1.9.1-10ubuntu2.1 (Ubuntu 5.04) Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi |
||
Cables, Connectors |
Juniper Networks EX3300-48P 48-Port PoE+ 4x SFP+ Network Switch w/ Power Cord
$43.95
Juniper Networks EX4300-48T 48 Port Gigabit 4 QSFP 40G 2xPSU AFO Network Switch
$89.00
Juniper EX4600-40F-AFI 24 SFP+/SFP Ports 4 QSFP+ Ports Dual AC Switch
$999.00
JUNIPER EX3400-48P 48x 1GB PoE+ RJ-45 4x 10GB SFP+ 2x 40GB QSFP+, DUAL AC POWER
$210.00
Juniper Networks EX3300 EX3300-48P 48-Port Gigabit PoE+ Switch
$40.10
Juniper QFX5100-48S-3AFO Switch 48 x 10Gb SFP+, 6x QSFP 40GE, Dual AC Power
$499.00
Juniper EX3300-48P, 48 Port PoE+ Gigabit Network Switch w/ Power cord
$54.99
JUNIPER EX4550-32F-AFO 32-PORT ETHERNET SWITCH 2x POWER SUPPLY - TESTED
$299.99
Juniper EX2300-48P PoE+ Switch 48x 1GbE & 4 SFP+/SFP 10G uplinks, Tested
$289.00
|
||
No Discussions have been posted on this vulnerability. |