Rapid7 Vulnerability & Exploit Database

RHSA-2014:1764: wget security update

Back to Search

RHSA-2014:1764: wget security update

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
10/29/2014
Created
07/25/2018
Added
10/31/2014
Modified
07/04/2017

Description

The wget package provides the GNU Wget file retrieval utility for HTTP,HTTPS, and FTP protocols.A flaw was found in the way Wget handled symbolic links. A malicious FTPserver could allow Wget running in the mirror mode (using the '-m' commandline option) to write an arbitrary file to a location writable to by theuser running Wget, possibly leading to code execution. (CVE-2014-4877)Note: This update changes the default value of the --retr-symlinks option.The file symbolic links are now traversed by default and pointed-to filesare retrieved rather than creating a symbolic link locally.Red Hat would like to thank the GNU Wget project for reporting this issue.Upstream acknowledges HD Moore of Rapid7, Inc as the original reporter.All users of wget are advised to upgrade to this updated package, whichcontains a backported patch to correct this issue.

Solution(s)

  • redhat-upgrade-wget
  • redhat-upgrade-wget-debuginfo

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;