First published: Wed Apr 03 2019(Updated: )
A buffer overflow vulnerability was found in GNU Wget 1.20.1 and earlier. An attacker may be able to cause a denial-of-service (DoS) or may execute an arbitrary code. References: <a href="https://jvn.jp/en/jp/JVN25261088/">https://jvn.jp/en/jp/JVN25261088/</a>
Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Wget | <=1.20.1 | |
redhat/wget | <1.20.3 | 1.20.3 |
debian/wget | 1.21-1+deb11u1 1.21.3-1 1.24.5-2 |
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=692d5c5215de0db482c252492a92fc424cc6a97c
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=562eacb76a2b64d5dc80a443f0f739bc9ef76c17
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5953 is a buffer overflow vulnerability in GNU Wget 1.20.1 and earlier that allows remote attackers to cause a denial-of-service or execute arbitrary code.
CVE-2019-5953 has a severity rating of 9.8, which is considered critical.
Versions of GNU Wget prior to 1.20.1 are affected by CVE-2019-5953.
To fix CVE-2019-5953, update your GNU Wget installation to version 1.20.3 or later.
You can find more information about CVE-2019-5953 at the following references: [CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5953), [JVN](https://jvn.jp/en/jp/JVN25261088/), [GNU Wget](https://lists.gnu.org/archive/html/bug-wget/2019-04/msg00001.html).