Intrusion Prevention

GNU.Wget.fd_read_body.skip_short_body.Buffer.Overflow

Description

This indicates an attack attempt against a Buffer Overflow vulnerability in GNU Wget.
The vulnerability is caused by an error when the vulnerable software handles a maliciously crafted HTTP response. A remote attacker may be able execute arbitrary code on the target system by tricking the user to send a HTTP request to the vulnerable software.

Affected Products

GNU wget prior to 1.19.2

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor.
http://git.savannah.gnu.org/cgit/wget.git/commit/?h=v1.19.2&id=ba6b44f6745b14dce414761a8e4b35d31b176bba