First published: Mon Oct 27 2008(Updated: )
Lynx is a text-based Web browser.<br>An arbitrary command execution flaw was found in the Lynx "lynxcgi:" URI<br>handler. An attacker could create a web page redirecting to a malicious URL<br>that could execute arbitrary code as the user running Lynx in the<br>non-default "Advanced" user mode. (CVE-2008-4690)<br>Note: In these updated lynx packages, Lynx will always prompt users before<br>loading a "lynxcgi:" URI. Additionally, the default lynx.cfg configuration<br>file now marks all "lynxcgi:" URIs as untrusted by default.<br>A flaw was found in a way Lynx handled ".mailcap" and ".mime.types"<br>configuration files. Files in the browser's current working directory were<br>opened before those in the user's home directory. A local attacker, able to<br>convince a user to run Lynx in a directory under their control, could<br>possibly execute arbitrary commands as the user running Lynx. (CVE-2006-7234)<br>All users of Lynx are advised to upgrade to this updated package, which<br>contains backported patches correcting these issues.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/lynx | <2.8.5-28.1.el5_2.1 | 2.8.5-28.1.el5_2.1 |
redhat/lynx | <2.8.5-28.1.el5_2.1 | 2.8.5-28.1.el5_2.1 |
redhat/lynx | <2.8.5-18.2.el4_7.1 | 2.8.5-18.2.el4_7.1 |
redhat/lynx | <2.8.5-18.2.el4_7.1 | 2.8.5-18.2.el4_7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2008:0965 is classified as important due to the potential for arbitrary command execution.
To fix RHSA-2008:0965, update Lynx to versions 2.8.5-28.1.el5_2.1 or 2.8.5-18.2.el4_7.1 or later.
The impact of the RHSA-2008:0965 vulnerability allows an attacker to execute arbitrary commands through malicious URLs.
RHSA-2008:0965 affects Lynx versions prior to 2.8.5-28.1.el5_2.1 and 2.8.5-18.2.el4_7.1.
Yes, the vulnerability in RHSA-2008:0965 can be exploited remotely through specially crafted web pages.