First published: Thu Jun 05 2003(Updated: )
Buffer overflow in url_filename function for wget 1.8.1 allows attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long URL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wget | 1.20.1-1.1 1.21-1+deb11u1 1.21.3-1 1.21.4-1 | |
CentOS Dos2unix | =7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1565 is considered a critical vulnerability due to its potential to cause denial of service and execute arbitrary code.
To fix CVE-2002-1565, you should upgrade to wget version 1.20.1-1.1 or later, or apply any available patches from your Linux distribution.
CVE-2002-1565 affects versions of wget prior to 1.20.1 and may also impact specific Immunix distributions.
CVE-2002-1565 can lead to a segmentation fault and potentially allow attackers to execute arbitrary code, posing a significant risk to system integrity.
Until a patch is applied, avoiding the use of wget or restricting the input of long URLs can serve as a temporary workaround for CVE-2002-1565.