Lucene search

K
debianDebianDEBIAN:DLA-1175-1:D5137
HistoryNov 18, 2017 - 1:47 a.m.

[SECURITY] [DLA 1175-1] lynx-cur security update

2017-11-1801:47:06
lists.debian.org
17

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

5.5

Confidence

High

EPSS

0.002

Percentile

52.6%

Package : lynx-cur
Version : 2.8.8dev.12-2+deb7u2
CVE ID : CVE-2017-1000211

It was discovered that there was a use-after-free vulnerability in the
HTML parser of lynx-cur, a terminal-based web browser. This could have
led to memory/information disclosure.

For Debian 7 "Wheezy", this issue has been fixed in lynx-cur version
2.8.8dev.12-2+deb7u2.

We recommend that you upgrade your lynx-cur packages.

Regards,


  ,''`.
 : :'  :     Chris Lamb
 `. `'`      [email protected] / chris-lamb.co.uk
   `-

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

5.5

Confidence

High

EPSS

0.002

Percentile

52.6%