CVE-2004-1488

wget 1.8.x and 1.9.x does not filter or quote control characters when displaying HTTP responses to the terminal, which may allow remote malicious web servers to inject terminal escape sequences and execute arbitrary code.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnu:wget:1.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:wget:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:wget:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:wget:1.9:*:*:*:*:*:*:*
cpe:2.3:a:gnu:wget:1.9.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:51

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261755 - Exploit, Vendor Advisory () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261755 - Exploit, Vendor Advisory
References () http://marc.info/?l=bugtraq&m=110269474112384&w=2 - () http://marc.info/?l=bugtraq&m=110269474112384&w=2 -
References () http://secunia.com/advisories/20960 - () http://secunia.com/advisories/20960 -
References () http://securitytracker.com/id?1012472 - () http://securitytracker.com/id?1012472 -
References () http://www.novell.com/linux/security/advisories/2006_16_sr.html - () http://www.novell.com/linux/security/advisories/2006_16_sr.html -
References () http://www.redhat.com/support/errata/RHSA-2005-771.html - () http://www.redhat.com/support/errata/RHSA-2005-771.html -
References () http://www.securityfocus.com/bid/11871 - Exploit, Vendor Advisory () http://www.securityfocus.com/bid/11871 - Exploit, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/18421 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/18421 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9750 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9750 -
References () https://usn.ubuntu.com/145-1/ - () https://usn.ubuntu.com/145-1/ -

Information

Published : 2005-04-27 04:00

Updated : 2024-11-20 23:51


NVD link : CVE-2004-1488

Mitre link : CVE-2004-1488

CVE.ORG link : CVE-2004-1488


JSON object : View

Products Affected

gnu

  • wget