CVE-2018-0494

NameCVE-2018-0494
DescriptionGNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \r\n sequence in a continuation line.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1375-1, DSA-4195-1
Debian Bugs898076

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
wget (PTS)jessie, jessie (lts)1.16-1+deb8u7fixed
stretch (security), stretch (lts), stretch1.18-5+deb9u3fixed
buster1.20.1-1.1fixed
bullseye1.21-1+deb11u1fixed
bookworm1.21.3-1fixed
sid, trixie1.24.5-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
wgetsourcewheezy1.13.4-3+deb7u6DLA-1375-1
wgetsourcejessie1.16-1+deb8u5DSA-4195-1
wgetsourcestretch1.18-5+deb9u2DSA-4195-1
wgetsource(unstable)1.19.5-1898076

Notes

https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html
https://savannah.gnu.org/bugs/?53763
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd
https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt

Search for package or bug name: Reporting problems