GNU.Wget.fd_read_body.skip_short_body.Buffer.Overflow

description-logoDescription

This indicates an attack attempt against a Buffer Overflow vulnerability in GNU Wget.
The vulnerability is caused by an error when the vulnerable software handles a maliciously crafted HTTP response. A remote attacker may be able execute arbitrary code on the target system by tricking the user to send a HTTP request to the vulnerable software.

affected-products-logoAffected Products

GNU wget prior to 1.19.2

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
http://git.savannah.gnu.org/cgit/wget.git/commit/?h=v1.19.2&id=ba6b44f6745b14dce414761a8e4b35d31b176bba

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)