Lynx is a text-based Web browser.
An arbitrary command execution flaw was found in the Lynx βlynxcgi:β URI
handler. An attacker could create a web page redirecting to a malicious URL
that could execute arbitrary code as the user running Lynx in the
non-default βAdvancedβ user mode. (CVE-2008-4690)
Note: In these updated lynx packages, Lynx will always prompt users before
loading a βlynxcgi:β URI. Additionally, the default lynx.cfg configuration
file now marks all βlynxcgi:β URIs as untrusted by default.
A flaw was found in a way Lynx handled β.mailcapβ and β.mime.typesβ
configuration files. Files in the browserβs current working directory were
opened before those in the userβs home directory. A local attacker, able to
convince a user to run Lynx in a directory under their control, could
possibly execute arbitrary commands as the user running Lynx. (CVE-2006-7234)
All users of Lynx are advised to upgrade to this updated package, which
contains backported patches correcting these issues.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 5 | x86_64 | lynx | <Β 2.8.5-28.1.el5_2.1 | lynx-2.8.5-28.1.el5_2.1.x86_64.rpm |
RedHat | 4 | s390 | lynx | <Β 2.8.5-18.2.el4_7.1 | lynx-2.8.5-18.2.el4_7.1.s390.rpm |
RedHat | 4 | x86_64 | lynx | <Β 2.8.5-18.2.el4_7.1 | lynx-2.8.5-18.2.el4_7.1.x86_64.rpm |
RedHat | any | i386 | lynx | <Β 2.8.4-18.1.3 | lynx-2.8.4-18.1.3.i386.rpm |
RedHat | 4 | i386 | lynx | <Β 2.8.5-18.2.el4_7.1 | lynx-2.8.5-18.2.el4_7.1.i386.rpm |
RedHat | any | x86_64 | lynx | <Β 2.8.5-11.3 | lynx-2.8.5-11.3.x86_64.rpm |
RedHat | any | s390 | lynx | <Β 2.8.5-11.3 | lynx-2.8.5-11.3.s390.rpm |
RedHat | any | ia64 | lynx | <Β 2.8.5-11.3 | lynx-2.8.5-11.3.ia64.rpm |
RedHat | 5 | i386 | lynx | <Β 2.8.5-28.1.el5_2.1 | lynx-2.8.5-28.1.el5_2.1.i386.rpm |
RedHat | any | i386 | lynx | <Β 2.8.5-11.3 | lynx-2.8.5-11.3.i386.rpm |