Lucene search

K
centosCentOS ProjectCESA-2008:0965
HistoryOct 27, 2008 - 8:12 p.m.

lynx security update

2008-10-2720:12:24
CentOS Project
lists.centos.org
48

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.015

Percentile

87.2%

CentOS Errata and Security Advisory CESA-2008:0965

Lynx is a text-based Web browser.

An arbitrary command execution flaw was found in the Lynx β€œlynxcgi:” URI
handler. An attacker could create a web page redirecting to a malicious URL
that could execute arbitrary code as the user running Lynx in the
non-default β€œAdvanced” user mode. (CVE-2008-4690)

Note: In these updated lynx packages, Lynx will always prompt users before
loading a β€œlynxcgi:” URI. Additionally, the default lynx.cfg configuration
file now marks all β€œlynxcgi:” URIs as untrusted by default.

A flaw was found in a way Lynx handled β€œ.mailcap” and β€œ.mime.types”
configuration files. Files in the browser’s current working directory were
opened before those in the user’s home directory. A local attacker, able to
convince a user to run Lynx in a directory under their control, could
possibly execute arbitrary commands as the user running Lynx. (CVE-2006-7234)

All users of Lynx are advised to upgrade to this updated package, which
contains backported patches correcting these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2008-October/077512.html
https://lists.centos.org/pipermail/centos-announce/2008-October/077513.html
https://lists.centos.org/pipermail/centos-announce/2008-October/077514.html
https://lists.centos.org/pipermail/centos-announce/2008-October/077515.html
https://lists.centos.org/pipermail/centos-announce/2008-October/077520.html
https://lists.centos.org/pipermail/centos-announce/2008-October/077521.html
https://lists.centos.org/pipermail/centos-announce/2008-October/077523.html
https://lists.centos.org/pipermail/centos-announce/2008-October/077524.html
https://lists.centos.org/pipermail/centos-announce/2008-October/077525.html
https://lists.centos.org/pipermail/centos-announce/2008-October/077526.html

Affected packages:
lynx

Upstream details at:
https://access.redhat.com/errata/RHSA-2008:0965

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.015

Percentile

87.2%