CVE-2019-5953
Published: 04 April 2019
Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors.
Priority
CVSS 3 base score: 9.8
Status
Package | Release | Status |
---|---|---|
wget Launchpad, Ubuntu, Debian |
Upstream |
Released
(1.20.3)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(1.19.4-1ubuntu2.2)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(1.17.1-1ubuntu1.5)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(1.15-1ubuntu1.14.04.5)
|
|
Patches: Upstream: https://git.savannah.gnu.org/cgit/wget.git/commit/?id=692d5c5215de0db482c252492a92fc424cc6a97c Upstream: https://git.savannah.gnu.org/cgit/wget.git/commit/?id=562eacb76a2b64d5dc80a443f0f739bc9ef76c17 |
Notes
Author | Note |
---|---|
mdeslaur | actually fixed in 1.20.3, not in 1.20.2 |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5953
- https://jvn.jp/en/jp/JVN25261088/
- https://lists.gnu.org/archive/html/bug-wget/2019-04/msg00001.html
- https://usn.ubuntu.com/usn/usn-3943-1
- https://usn.ubuntu.com/usn/usn-3943-2
- NVD
- Launchpad
- Debian