CVE-2018-0494

NameCVE-2018-0494
DescriptionGNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \r\n sequence in a continuation line.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1375-1, DSA-4195-1
NVD severitymedium
Debian Bugs898076

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
wget (PTS)stretch (security), stretch1.18-5+deb9u3fixed
buster1.20.1-1.1fixed
bullseye, sid1.21-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
wgetsourcewheezy1.13.4-3+deb7u6DLA-1375-1
wgetsourcejessie1.16-1+deb8u5DSA-4195-1
wgetsourcestretch1.18-5+deb9u2DSA-4195-1
wgetsource(unstable)1.19.5-1898076

Notes

https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html
https://savannah.gnu.org/bugs/?53763
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd
https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt

Search for package or bug name: Reporting problems