wget 1.8.x and 1.9.x does not filter or quote control characters when displaying HTTP responses to the terminal, which may allow remote malicious web servers to inject terminal escape sequences and execute arbitrary code.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261755 - Exploit, Vendor Advisory | |
References | () http://marc.info/?l=bugtraq&m=110269474112384&w=2 - | |
References | () http://secunia.com/advisories/20960 - | |
References | () http://securitytracker.com/id?1012472 - | |
References | () http://www.novell.com/linux/security/advisories/2006_16_sr.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2005-771.html - | |
References | () http://www.securityfocus.com/bid/11871 - Exploit, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/18421 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9750 - | |
References | () https://usn.ubuntu.com/145-1/ - |
Information
Published : 2005-04-27 04:00
Updated : 2024-11-20 23:51
NVD link : CVE-2004-1488
Mitre link : CVE-2004-1488
CVE.ORG link : CVE-2004-1488
JSON object : View
Products Affected
gnu
- wget
CWE