Family: Debian Local Security Checks --> Category: infos
[DSA1085] DSA-1085-1 lynx-cur Vulnerability Scan
Vulnerability Scan Summary
Detailed Explanation for this Vulnerability Test
Several vulnerabilities have been discovered in lynx, the popular
text-mode WWW browser. The Common Vulnerabilities and Exposures
Project identifies the following vulnerabilities:
Michal Zalewski discovered that lynx is not able to grok invalid
HTML including a TEXTAREA tag with a large COLS value and a large
tag name in an element that is not terminated, and loops forever
trying to render the broken HTML.
Ulf Härnhammar discovered a buffer overflow that can be remotely
exploited. During the handling of Asian characters when connecting
to an NNTP server lynx can be tricked to write past the boundary
of a buffer which can lead to the execution of arbitrary code.
For the old stable distribution (woody) these problems have been fixed in
For the stable distribution (sarge) these problems have been fixed in
For the unstable distribution (sid) these problems will be fixed soon.
We recommend that you upgrade your lynx-cur package.
Solution : http://www.debian.org/security/2006/dsa-1085
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.