Buffer overflow in url_filename function for wget 1.8.1 allows attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long URL.
Link | Tags |
---|---|
ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc | vendor advisory |
ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-003.0.txt | vendor advisory |
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000716 | vendor advisory |
http://www.debian.org/security/2002/dsa-209 | patch vendor advisory |
http://marc.info/?l=bugtraq&m=105474357016184&w=2 | mailing list |
http://www.redhat.com/support/errata/RHSA-2003-372.html | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/10851 | vdb entry |