FreeBSD : wget -- path traversal vulnerability in recursive FTP mode (ee7b4f9d-66c8-11e4-9ae1-e8e0b722a85e)

high Nessus Plugin ID 79079

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

MITRE reports :

Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?f4947423

Plugin Details

Severity: High

ID: 79079

File Name: freebsd_pkg_ee7b4f9d66c811e49ae1e8e0b722a85e.nasl

Version: 1.5

Type: local

Published: 11/10/2014

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:wget, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 11/8/2014

Vulnerability Publication Date: 10/27/2014

Reference Information

CVE: CVE-2014-4877

CERT: 685996