Solution
Please Install the Updated Packages.
Insight
Lynx is a text-based Web browser.
An arbitrary command execution flaw was found in the Lynx " lynxcgi:"
URI
handler. An attacker could create a web page redirecting to a malicious URL that could execute arbitrary code as the user running Lynx in the non-default "
Advanced"
user mode. (CVE-2008-4690)
Note: In these updated lynx packages, Lynx will always prompt users before loading a "
lynxcgi:"
URI. Additionally, the default lynx.cfg configuration file now marks all "
lynxcgi:"
URIs as untrusted by default.
A flaw was found in a way Lynx handled "
.mailcap"
and "
.mime.types"
configuration files. Files in the browser's current working directory were opened before those in the user's home directory. A local attacker, able to convince a user to run Lynx in a directory under their control, could possibly execute arbitrary commands as the user running Lynx. (CVE-2006-7234)
All users of Lynx are advised to upgrade to this updated package, which contains backported patches correcting these issues.
Affected
lynx on CentOS 2
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2006-7234, CVE-2008-4690 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities