First published: Sun Feb 27 2000(Updated: )
Buffer overflow in Lynx 2.x allows remote attackers to crash Lynx and possibly execute commands via a long URL in a malicious web page.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lynx | =2.7 | |
Lynx | =2.8 | |
Lynx | =2.8.3_dev22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0209 has a critical severity level due to the potential for remote code execution and denial of service.
To fix CVE-2000-0209, upgrade to Lynx version 2.8.4 or later where the buffer overflow vulnerability has been addressed.
CVE-2000-0209 affects Lynx versions 2.7, 2.8, and specifically 2.8.3_dev22.
Attackers exploiting CVE-2000-0209 can crash Lynx or potentially execute arbitrary commands on the affected system.
CVE-2000-0209 was discovered in 2000, indicating that it's a long-standing vulnerability that should be addressed promptly.