Subject: | |
From: | |
Reply To: | |
Date: | Mon, 27 Oct 2008 15:31:12 -0500 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Synopsis: Important: lynx security update
Issue date: 2008-10-27
CVE Names: CVE-2008-4690 CVE-2006-7234
An arbitrary command execution flaw was found in the Lynx "lynxcgi:" URI
handler. An attacker could create a web page redirecting to a malicious URL
that could execute arbitrary code as the user running Lynx in the
non-default "Advanced" user mode. (CVE-2008-4690)
Note: In these updated lynx packages, Lynx will always prompt users before
loading a "lynxcgi:" URI. Additionally, the default lynx.cfg configuration
file now marks all "lynxcgi:" URIs as untrusted by default.
A flaw was found in a way Lynx handled ".mailcap" and ".mime.types"
configuration files. Files in the browser's current working directory were
opened before those in the user's home directory. A local attacker, able to
convince a user to run Lynx in a directory under their control, could
possibly execute arbitrary commands as the user running Lynx. (CVE-2006-7234)
SL 3.0.x
SRPMS:
lynx-2.8.5-11.3.src.rpm
i386:
lynx-2.8.5-11.3.i386.rpm
x86_64:
lynx-2.8.5-11.3.x86_64.rpm
SL 4.x
SRPMS:
lynx-2.8.5-18.2.el4_7.1.src.rpm
i386:
lynx-2.8.5-18.2.el4_7.1.i386.rpm
x86_64:
lynx-2.8.5-18.2.el4_7.1.x86_64.rpm
SL 5.x
SRPMS:
lynx-2.8.5-28.1.el5_2.1.src.rpm
i386:
lynx-2.8.5-28.1.el5_2.1.i386.rpm
x86_64:
lynx-2.8.5-28.1.el5_2.1.x86_64.rpm
-Connie Sieh
-Troy Dawson
|
|
|