First published: Fri Nov 18 2005(Updated: )
Lynx 2.8.5, and other versions before 2.8.6dev.15, allows remote attackers to execute arbitrary commands via (1) lynxcgi:, (2) lynxexec, and (3) lynxprog links, which are not properly restricted in the default configuration in some environments.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lynx | =2.8.6 | |
Lynx | =2.8.6_dev13 | |
Lynx | =2.8.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2929 has a moderate severity rating due to its potential for remote exploitation.
To fix CVE-2005-2929, upgrade Lynx to version 2.8.6 or later where the issue has been addressed.
CVE-2005-2929 affects Lynx versions prior to 2.8.6, specifically 2.8.5 and 2.8.6_dev13.
Yes, CVE-2005-2929 can be exploited by remote attackers due to improper restrictions in certain link types.
The links associated with CVE-2005-2929 include lynxcgi:, lynxexec, and lynxprog, which allow command execution.