[30349] in bugtraq

home help back first fref pref prev next nref lref last post

Immunix Secured OS 7+ wget update

daemon@ATHENA.MIT.EDU (Immunix Security Team)
Wed Jun 4 12:40:17 2003

Date: Tue, 3 Jun 2003 18:08:41 -0700
From: Immunix Security Team <security@immunix.com>
To: bugtraq@securityfocus.com
Message-ID: <20030604010841.GB5506@wirex.com>
Mail-Followup-To: bugtraq@securityfocus.com
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="XOIedfhf+7KOe/yw"
Content-Disposition: inline

--XOIedfhf+7KOe/yw
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

-----------------------------------------------------------------------
	Immunix Secured OS Security Advisory

Packages updated:	wget
Affected products:	ImmunixOS 7+
Bugs fixed:		CAN-2002-1344
Date:			Tue Jun  3 2003
Advisory ID:		IMNX-2003-7+-011-01
Author:			Seth Arnold <sarnold@immunix.com>
-----------------------------------------------------------------------

Description:
  Steven M. Christey has discovered wget did not perform sufficient
  input sanitization of ftp server responses; this could allow a
  malicious ftp server to overwrite files through wget, if the wget
  process permissions allow the file overwriting.

  Stefano Zacchiroli has found a buffer overrun that can make wget
  segfault on long URLs. We do not know if this is remotely exploitable.

  References: http://www.securityfocus.com/archive/1/303223

Package names and locations:
  Precompiled binary packages for Immunix 7+ are available at:
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/wget-1.8.2-4.70_imn=
x_3.i386.rpm

  Source packages for Immunix 7+ are available at:
  http://download.immunix.org/ImmunixOS/7+/Updates/SRPMS/wget-1.8.2-4.70_im=
nx_3.src.rpm

Immunix OS 7+ md5sums:
  681fd73f6ef0263747e2cc965b391cc2  RPMS/wget-1.8.2-4.70_imnx_3.i386.rpm
  d20a0fbab9ce8f8ff5fcfc8be23ec748  SRPMS/wget-1.8.2-4.70_imnx_3.src.rpm


GPG verification:                                                          =
    =20
  Our public key is available at <http://wirex.com/security/GPG_KEY>.      =
    =20

NOTE:
  Ibiblio is graciously mirroring our updates, so if the links above are
  slow, please try:
    ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
  or one of the many mirrors available at:
    http://www.ibiblio.org/pub/Linux/MIRRORS.html

  ImmunixOS 6.2 is no longer officially supported.
  ImmunixOS 7.0 is no longer officially supported.

Contact information:
  To report vulnerabilities, please contact security@wirex.com. WireX=20
  attempts to conform to the RFP vulnerability disclosure protocol
  <http://www.wiretrip.net/rfp/policy.html>.

--XOIedfhf+7KOe/yw
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAj7dRpkACgkQVQcWL60UVMuvugCglGauaDAsZAPQ0FqiIVHl4xlL
Yo0AnRYdOHq/UQlCA12W4yZXbzsgZs9v
=uMEl
-----END PGP SIGNATURE-----

--XOIedfhf+7KOe/yw--

home help back first fref pref prev next nref lref last post