GNU.Wget.fd_read_body.skip_short_body.Buffer.Overflow
Description
This indicates an attack attempt against a Buffer Overflow vulnerability in GNU Wget.
The vulnerability is caused by an error when the vulnerable software handles a maliciously crafted HTTP response. A remote attacker may be able execute arbitrary code on the target system by tricking the user to send a HTTP request to the vulnerable software.
Affected Products
GNU wget prior to 1.19.2
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
http://git.savannah.gnu.org/cgit/wget.git/commit/?h=v1.19.2&id=ba6b44f6745b14dce414761a8e4b35d31b176bba
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |