Summary
The remote host is missing an update to elinks
announced via advisory USN-851-1.
Solution
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS:
elinks 0.10.6-1ubuntu3.4
elinks-lite 0.10.6-1ubuntu3.4
After a standard system upgrade you need to restart Elinks to effect the necessary changes.
https://secure1.securityspace.com/smysecure/catid.html?in=USN-851-1
Insight
Teemu Salmela discovered that Elinks did not properly validate input when processing smb:// URLs. If a user were tricked into viewing a malicious website and had smbclient installed, a remote attacker could execute arbitrary code with the privileges of the user invoking the program.
(CVE-2006-5925)
Jakub Wilk discovered a logic error in Elinks, leading to a buffer overflow. If a user were tricked into viewing a malicious website, a remote attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2008-7224)
Severity
Classification
-
CVE CVE-2006-5925, CVE-2008-7224 -
CVSS Base Score: 7.8
AV:N/AC:L/Au:N/C:N/I:N/A:C
Related Vulnerabilities