First published: Mon Oct 18 2004(Updated: )
Lynx, lynx-ssl, and lynx-cur before 2.8.6dev.8 allow remote attackers to cause a denial of service (infinite loop) via a web page or HTML email that contains invalid HTML including (1) a TEXTAREA tag with a large COLS value and (2) a large tag name in an element that is not terminated, as demonstrated by mangleme. NOTE: a followup suggests that the relevant trigger for this issue is the large COLS value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lynx | =2.7 | |
Lynx | =2.8 | |
Lynx | =2.8.1 | |
Lynx | =2.8.2_rel1 | |
Lynx | =2.8.3 | |
Lynx | =2.8.3_dev22 | |
Lynx | =2.8.3_pre5 | |
Lynx | =2.8.3_rel1 | |
Lynx | =2.8.4 | |
Lynx | =2.8.4_rel1 | |
Lynx | =2.8.5 | |
Lynx | =2.8.5_dev2 | |
Lynx | =2.8.5_dev3 | |
Lynx | =2.8.5_dev4 | |
Lynx | =2.8.5_dev5 | |
Lynx | =2.8.5_dev8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1617 is classified as a denial of service vulnerability that can result in an infinite loop.
To fix CVE-2004-1617, upgrade to Lynx version 2.8.6dev.8 or later.
CVE-2004-1617 affects various Lynx versions prior to 2.8.6dev.8, including 2.7, 2.8, and all 2.8.x versions.
Yes, CVE-2004-1617 can be exploited remotely by delivering specially crafted web pages or HTML emails.
Exploitation of CVE-2004-1617 typically results in the Lynx browser entering an infinite loop, effectively causing a denial of service.