First published: Mon Oct 17 2005(Updated: )
Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and earlier allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters.
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lynx | =2.8.3 | |
Lynx | =2.8.4 | |
Lynx | =2.8.6 | |
Lynx | =2.8.6_dev13 | |
Lynx | <=2.8.6 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3120 is classified as a critical security vulnerability due to its potential for remote code execution.
To fix CVE-2005-3120, update Lynx to version 2.8.7 or later, which contains the necessary patches.
CVE-2005-3120 affects Lynx versions 2.8.6 and earlier, including 2.8.3, 2.8.4, and 2.8.6_dev13.
CVE-2005-3120 exploits a stack-based buffer overflow triggered by malicious article headers containing specific Asian characters.
Yes, there are exploits available that leverage CVE-2005-3120 to execute arbitrary code on vulnerable systems.