First published: Mon Oct 18 2004(Updated: )
Lynx, lynx-ssl, and lynx-cur before 2.8.6dev.8 allow remote attackers to cause a denial of service (infinite loop) via a web page or HTML email that contains invalid HTML including (1) a TEXTAREA tag with a large COLS value and (2) a large tag name in an element that is not terminated, as demonstrated by mangleme. NOTE: a followup suggests that the relevant trigger for this issue is the large COLS value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
University Of Kansas Lynx | =2.8.4 | |
University Of Kansas Lynx | =2.8.3_pre5 | |
University Of Kansas Lynx | =2.8.5_dev5 | |
University Of Kansas Lynx | =2.7 | |
University Of Kansas Lynx | =2.8.4_rel1 | |
University Of Kansas Lynx | =2.8.1 | |
University Of Kansas Lynx | =2.8 | |
University Of Kansas Lynx | =2.8.3 | |
University Of Kansas Lynx | =2.8.5_dev8 | |
University Of Kansas Lynx | =2.8.2_rel1 | |
University Of Kansas Lynx | =2.8.5_dev3 | |
University Of Kansas Lynx | =2.8.3_rel1 | |
University Of Kansas Lynx | =2.8.5_dev2 | |
University Of Kansas Lynx | =2.8.5_dev4 | |
University Of Kansas Lynx | =2.8.3_dev22 | |
University Of Kansas Lynx | =2.8.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.