Bug 37052 - wget: Symlink attack (4.0)
wget: Symlink attack (4.0)
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.0
Other Linux
: P3 normal (vote)
: UCS 4.0-1
Assigned To: Moritz Muehlenhoff
Janek Walkenhorst
Depends on:
  Show dependency treegraph
Reported: 2014-11-26 14:36 CET by Moritz Muehlenhoff
Modified: 2017-10-26 13:54 CEST (History)
0 users

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score:


Note You need to log in before you can comment on or make changes to this bug.
Description Moritz Muehlenhoff univentionstaff 2014-11-26 14:36:19 CET
+++ This bug was initially created as a clone of Bug #36368 +++

If wget is used to recursively download a directory over FTP, a symlink attack can create arbitrary file or overwrite existing ones (CVE-2014-4877).
Comment 1 Moritz Muehlenhoff univentionstaff 2015-02-03 07:47:09 CET
This was fixed during the import of the Wheezy 7.8 point update in Bug 37511
Comment 2 Stefan Gohmann univentionstaff 2015-02-11 10:58:57 CET
UCS 4.0-1 has been released:

If this error occurs again, please use "Clone This Bug".