Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-5953

Опубликовано: 17 мая 2019
Источник: debian

Описание

Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wgetfixed1.20.1-1.1package

Примечания

  • https://jvn.jp/en/jp/JVN25261088/

  • https://lists.gnu.org/archive/html/bug-wget/2019-04/msg00001.html

  • https://lists.gnu.org/archive/html/bug-wget/2019-04/msg00012.html

  • https://git.savannah.gnu.org/cgit/wget.git/commit/?id=692d5c5215de0db482c252492a92fc424cc6a97c

  • https://git.savannah.gnu.org/cgit/wget.git/commit/?id=562eacb76a2b64d5dc80a443f0f739bc9ef76c17 (removed unneeded debug lines in fixing commit)

  • Fixed in 1.20.3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 6 лет назад

Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors.

CVSS3: 8.8
redhat
почти 7 лет назад

Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors.

CVSS3: 9.8
nvd
больше 6 лет назад

Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors.

suse-cvrf
почти 7 лет назад

Security update for wget

suse-cvrf
почти 7 лет назад

Security update for wget