[arch-security] [Arch Linux Security Advisory ASA-201410-14] wget: arbitrary filesystem access
Remi Gacogne
rgacogne at archlinux.org
Wed Oct 29 08:56:52 UTC 2014
Arch Linux Security Advisory ASA-201410-14
==========================================
Severity: Medium
Date : 2014-10-29
CVE-ID : CVE-2014-4877
Package : wget
Type : arbitrary filesystem access
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE-2014
Summary
=======
The package wget before version 1.16-2 is vulnerable to arbitrary
filesystem access.
Resolution
==========
Upgrade to 1.16-2.
# pacman -Syu "wget>=1.16-2"
The problem has been fixed upstream in version 1.16.
Workaround
==========
Do not use the --retr-symlinks=yes option when recursively retrieving a
directory from an untrusted FTP server or over an untrusted connection.
Description
===========
It was found that wget was susceptible to a symlink attack which could
create arbitrary files, directories or symbolic links and set their
permissions when retrieving a directory recursively through FTP.
By default, when retrieving ftp directories recursively and a symbolic
link is encountered, the symbolic link is traversed and the pointed-to
files are retrieved. This option poses a security risk where a malicious
FTP Server may cause Wget to write to files outside of the intended
directories through a specially crafted .listing file.
Impact
======
A malicious FTP server or a malicious attacker in position of
man-in-the-middle could create arbitrary files, directories or symbolic
links and set their permissions when retrieving a directory recursively
through FTP.
References
==========
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4877
https://bugzilla.redhat.com/show_bug.cgi?id=1139181
http://seclists.org/oss-sec/2014/q4/453
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20141029/4713d6a1/attachment.bin>
More information about the arch-security
mailing list