First published: Sun May 06 2018(Updated: )
GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \r\n sequence in a continuation line.
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wget | <=1.19.4-1<=1.16-1 | 1.19.5-1 1.18-5+deb9u2 1.16-1+deb8u5 |
GNU Wget | <1.19.5 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
redhat/wget | <1.19.5 | 1.19.5 |
ubuntu/wget | <1.19.1-3ubuntu1.2 | 1.19.1-3ubuntu1.2 |
ubuntu/wget | <1.19.4-1ubuntu2.1 | 1.19.4-1ubuntu2.1 |
ubuntu/wget | <1.15-1ubuntu1.14.04.4 | 1.15-1ubuntu1.14.04.4 |
ubuntu/wget | <1.19.5-1 | 1.19.5-1 |
ubuntu/wget | <1.17.1-1ubuntu1.4 | 1.17.1-1ubuntu1.4 |
debian/wget | 1.21-1+deb11u1 1.21.3-1 1.24.5-2 |
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2018-0494.
The title of this vulnerability is 'GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http...'.
The severity of CVE-2018-0494 is medium with a CVSS score of 6.5.
GNU Wget before 1.19.5 is affected by CVE-2018-0494.
To fix CVE-2018-0494, you should update GNU Wget to version 1.19.5 or later.