Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.871702
Categoría:Red Hat Local Security Checks
Título:RedHat Update for wget RHSA-2016:2587-02
Resumen:The remote host is missing an update for the 'wget'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'wget'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The wget packages provide the GNU Wget file
retrieval utility for HTTP, HTTPS, and FTP protocols.

Security Fix(es):

* It was found that wget used a file name provided by the server for the
downloaded file when following an HTTP redirect to a FTP server resource.
This could cause wget to create a file with a different name than expected,
possibly allowing the server to execute arbitrary code on the client.
(CVE-2016-4971)

Red Hat would like to thank GNU wget project for reporting this issue.
Upstream acknowledges Dawid Golunski as the original reporter.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.3 Release Notes linked from the References section.

Affected Software/OS:
wget on Red Hat Enterprise Linux Server (v. 7)

Solution:
Please Install the Updated Packages.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2016-4971
BugTraq ID: 91530
http://www.securityfocus.com/bid/91530
https://www.exploit-db.com/exploits/40064/
https://security.gentoo.org/glsa/201610-11
http://packetstormsecurity.com/files/162395/GNU-wget-Arbitrary-File-Upload-Code-Execution.html
http://lists.gnu.org/archive/html/info-gnu/2016-06/msg00004.html
RedHat Security Advisories: RHSA-2016:2587
http://rhn.redhat.com/errata/RHSA-2016-2587.html
http://www.securitytracker.com/id/1036133
SuSE Security Announcement: openSUSE-SU-2016:2027 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-08/msg00043.html
http://www.ubuntu.com/usn/USN-3012-1
CopyrightCopyright (C) 2016 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.