You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa wget

Sigurnosni nedostaci programskog paketa wget

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3643-1
May 09, 2018

wget vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 17.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Wget could be made to inject arbitrary cookie values.

Software Description:
– wget: retrieves files from the web

Details:

It was discovered that Wget incorrectly handled certain inputs.
An attacker could possibly use this to inject arbitrary cookie values.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
wget                            1.19.4-1ubuntu2.1

Ubuntu 17.10:
wget                            1.19.1-3ubuntu1.2

Ubuntu 16.04 LTS:
wget                            1.17.1-1ubuntu1.4

Ubuntu 14.04 LTS:
wget                            1.15-1ubuntu1.14.04.4

In general, a standard system update will make all the necessary
changes.

References:
https://usn.ubuntu.com/usn/usn-3643-1
CVE-2018-0494

Package Information:
https://launchpad.net/ubuntu/+source/wget/1.19.4-1ubuntu2.1
https://launchpad.net/ubuntu/+source/wget/1.19.1-3ubuntu1.2
https://launchpad.net/ubuntu/+source/wget/1.17.1-1ubuntu1.4
https://launchpad.net/ubuntu/+source/wget/1.15-1ubuntu1.14.04.4—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=EmoP
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-3643-2
May 09, 2018

wget vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 ESM

Summary:

Wget could be made to inject arbitrary cookie values.

Software Description:
– wget: retrieves files from the web

Details:

USN-3643-1 fixed a vulnerability in Wget. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

It was discovered that Wget incorrectly handled certain inputs.
An attacker could possibly use this to inject arbitrary cookie values.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
wget                            1.13.4-2ubuntu1.6

In general, a standard system update will make all the necessary
changes.

References:
https://usn.ubuntu.com/usn/usn-3643-2
https://usn.ubuntu.com/usn/usn-3643-1
CVE-2018-0494—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2

iQIcBAABCAAGBQJa8xk2AAoJEEW851uECx9pUWwQAIf5+yegfk9KBzZthDHhHrLk
V3JRjmc8e+yITgDl2docvJb91zq/1P3AnpaY0/LL1uQBsTJn8JP1/xULPHNJCmaA
j6D9LepOxJNVPebh+RSAZMxBUMB3AWy0XPsvX0L6+XQc/eLH/DbfqmHKkhmCDL8o
l8UXgrF6Ir1ERBsGajcHEpoIg/FzqxT+VeFlJ6YvtoH7TgphaqfkfzN7ArTP41Y9
1hxjImUoi0WuWpcYgyBbgkCLjaw4yuzh4ts7pBz0zzE5ZYJSeztki3V6dsTa7bTX
gfR/8g6jNnuTURPY0IeX/1w598PleL5EN/HabJmUNE0+jBwWbSFKMoaCBPna54G8
XTYpP6Af6Ai4i8yTUaaYeXZVdgMrdb3outVqDeJtQrkVt+1AEiOKyvTZaiKhfdSp
pemghybmt5au/1Rko8hjC6cEEKCkOY55+XBrjuNpMOjHIiv4A6HW1f7O2M97iiXz
j42/Jo5XTLUGyIbT+5YBjqDL5X0tD5em0a2/nmuClQFbbwGzfq72s2Qo5/nIcLbV
13feXFNM3rHb6GHWQ/6C/5jkUvff8LkbPgkVXVhBlbHzX3H9tbx2CnUJtZkrkMxY
wfCoAVu30qRZwrMN30pgQ2RSltqD3ROOX46Y+Y+T1k7HBGy8uE4XmbkTP+RXghBa
IEZT9N79e06UhBWeHNlu
=6qcB
—–END PGP SIGNATURE—–

AutorPetar Bertok
Cert idNCERT-REF-2018-05-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Nadogradnja za Microsoft Edge

Microsoft je izdao nadogradnju za otklanjanje ranjivosti u web pregledniku Microsoft Edge. Ovisno o tipu ranjivosti, potencijalni udaljeni napadači mogli...

Close