You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa wget

Sigurnosni nedostatak programskog paketa wget

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3012-1
June 20, 2016

wget vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 16.04 LTS
– Ubuntu 15.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS

Summary:

Wget could be made to overwrite files.

Software Description:
– wget: retrieves files from the web

Details:

Dawid Golunski discovered that Wget incorrectly handled filenames when
being redirected from an HTTP to an FTP URL. A malicious server could
possibly use this issue to overwrite local files.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
wget 1.17.1-1ubuntu1.1

Ubuntu 15.10:
wget 1.16.1-1ubuntu1.1

Ubuntu 14.04 LTS:
wget 1.15-1ubuntu1.14.04.2

Ubuntu 12.04 LTS:
wget 1.13.4-2ubuntu1.4

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-3012-1
CVE-2016-4971

Package Information:
https://launchpad.net/ubuntu/+source/wget/1.17.1-1ubuntu1.1
https://launchpad.net/ubuntu/+source/wget/1.16.1-1ubuntu1.1
https://launchpad.net/ubuntu/+source/wget/1.15-1ubuntu1.14.04.2
https://launchpad.net/ubuntu/+source/wget/1.13.4-2ubuntu1.4

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=3aKn
—–END PGP SIGNATURE—–

AutorMarko Stanec
Cert idNCERT-REF-2016-06-0108-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programske biblioteke xmlrpc-c

Otkriveni su sigurnosni nedostaci programske biblioteke xmlrpc-c za operacijski sustav Ubuntu. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje napada uskraćivanja usluge...

Close