Bug 36368 - wget: Symlink attack (3.2)
wget: Symlink attack (3.2)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 3.2
Other Linux
: P3 normal (vote)
: UCS 3.2-6-errata
Assigned To: Arvid Requate
Stefan Gohmann
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2014-10-31 13:11 CET by Moritz Muehlenhoff
Modified: 2015-08-21 13:14 CEST (History)
3 users (show)

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional): Security
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Moritz Muehlenhoff univentionstaff 2014-10-31 13:11:32 CET
If wget is used to recursively download a directory over FTP, a symlink attack can create arbitrary file or overwrite existing ones (CVE-2014-4877).
Comment 1 Arvid Requate univentionstaff 2015-08-18 17:01:21 CEST
Advisory: 2015-08-18-wget.yaml
Comment 2 Stefan Gohmann univentionstaff 2015-08-19 09:05:14 CEST
YAML: OK

Build log / Patches: OK
# zgrep CVE-2014-4877 /usr/share/doc/wget/changelog.Debian.gz
    setting of wget. Fixes security bug CVE-2014-4877  

Inst / Update i386: OK

Inst / Update amd64: OK
Comment 3 Janek Walkenhorst univentionstaff 2015-08-21 13:14:34 CEST
<http://errata.univention.de/ucs/3.2/362.html>