Dangerous bug fixed in wget

http://m.slashdot.org/story/209125

If you use wget to connect to ftp server, update.

Posted from WordPress for Android

2 Comments

  1. Tomi Engdahl says:

    The NO-NAME vuln: w g e t mess patched without a fancy brand
    Directory overwrite bug threatens all *nix boxen
    http://www.theregister.co.uk/2014/10/30/no_poodle_for_you_wget_vuln_patched_without_fancy_brand/

    Reply
  2. Tomi Engdahl says:

    The vulnerability is publicly identified as CVE-2014-4877.

    Reply

Leave a Comment

Your email address will not be published. Required fields are marked *

*

*