FreeBSD : wget -- path traversal vulnerability in recursive FTP mode (ee7b4f9d-66c8-11e4-9ae1-e8e0b722a85e)

High Nessus Plugin ID 79079


The remote FreeBSD host is missing a security-related update.


MITRE reports :

Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 79079

File Name: freebsd_pkg_ee7b4f9d66c811e49ae1e8e0b722a85e.nasl

Version: $Revision: 1.2 $

Type: local

Published: 2014/11/10

Modified: 2015/01/14

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:wget, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2014/11/08

Vulnerability Publication Date: 2014/10/27

Reference Information

CVE: CVE-2014-4877

CERT: 685996