Lynx is a text-based Web browser.
An arbitrary command execute bug was found in the lynx “lynxcgi:” URI
handler. An attacker could create a web page redirecting to a malicious URL
which could execute arbitrary code as the user running lynx. The Common
Vulnerabilities and Exposures project assigned the name CVE-2005-2929 to
this issue.
Users should update to this erratum package, which contains a backported
patch to correct this issue.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | any | x86_64 | lynx | < 2.8.5-11.2 | lynx-2.8.5-11.2.x86_64.rpm |
RedHat | any | ia64 | lynx | < 2.8.4-18.1.2 | lynx-2.8.4-18.1.2.ia64.rpm |
RedHat | any | ia64 | lynx | < 2.8.5-11.2 | lynx-2.8.5-11.2.ia64.rpm |
RedHat | any | s390x | lynx | < 2.8.5-18.2 | lynx-2.8.5-18.2.s390x.rpm |
RedHat | any | x86_64 | lynx | < 2.8.5-18.2 | lynx-2.8.5-18.2.x86_64.rpm |
RedHat | any | ppc | lynx | < 2.8.5-18.2 | lynx-2.8.5-18.2.ppc.rpm |
RedHat | any | ppc | lynx | < 2.8.5-11.2 | lynx-2.8.5-11.2.ppc.rpm |
RedHat | any | s390 | lynx | < 2.8.5-11.2 | lynx-2.8.5-11.2.s390.rpm |
RedHat | any | i386 | lynx | < 2.8.5-18.2 | lynx-2.8.5-18.2.i386.rpm |
RedHat | any | ia64 | lynx | < 2.8.5-18.2 | lynx-2.8.5-18.2.ia64.rpm |