[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: Immunix Secured OS 7+ wget update
From: Immunix Security Team <security () immunix ! com>
Date: 2003-06-04 1:08:41
[Download RAW message or body]
-----------------------------------------------------------------------
Immunix Secured OS Security Advisory
Packages updated: wget
Affected products: ImmunixOS 7+
Bugs fixed: CAN-2002-1344
Date: Tue Jun 3 2003
Advisory ID: IMNX-2003-7+-011-01
Author: Seth Arnold <sarnold@immunix.com>
-----------------------------------------------------------------------
Description:
Steven M. Christey has discovered wget did not perform sufficient
input sanitization of ftp server responses; this could allow a
malicious ftp server to overwrite files through wget, if the wget
process permissions allow the file overwriting.
Stefano Zacchiroli has found a buffer overrun that can make wget
segfault on long URLs. We do not know if this is remotely exploitable.
References: http://www.securityfocus.com/archive/1/303223
Package names and locations:
Precompiled binary packages for Immunix 7+ are available at:
http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/wget-1.8.2-4.70_imnx_3.i386.rpm
Source packages for Immunix 7+ are available at:
http://download.immunix.org/ImmunixOS/7+/Updates/SRPMS/wget-1.8.2-4.70_imnx_3.src.rpm
Immunix OS 7+ md5sums:
681fd73f6ef0263747e2cc965b391cc2 RPMS/wget-1.8.2-4.70_imnx_3.i386.rpm
d20a0fbab9ce8f8ff5fcfc8be23ec748 SRPMS/wget-1.8.2-4.70_imnx_3.src.rpm
GPG verification:
Our public key is available at <http://wirex.com/security/GPG_KEY>.
NOTE:
Ibiblio is graciously mirroring our updates, so if the links above are
slow, please try:
ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
or one of the many mirrors available at:
http://www.ibiblio.org/pub/Linux/MIRRORS.html
ImmunixOS 6.2 is no longer officially supported.
ImmunixOS 7.0 is no longer officially supported.
Contact information:
To report vulnerabilities, please contact security@wirex.com. WireX
attempts to conform to the RFP vulnerability disclosure protocol
<http://www.wiretrip.net/rfp/policy.html>.
[Attachment #3 (application/pgp-signature)]
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic