Ubuntu USN-851-1 (elinks)

Summary
The remote host is missing an update to elinks announced via advisory USN-851-1.
Solution
The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: elinks 0.10.6-1ubuntu3.4 elinks-lite 0.10.6-1ubuntu3.4 After a standard system upgrade you need to restart Elinks to effect the necessary changes. https://secure1.securityspace.com/smysecure/catid.html?in=USN-851-1
Insight
Teemu Salmela discovered that Elinks did not properly validate input when processing smb:// URLs. If a user were tricked into viewing a malicious website and had smbclient installed, a remote attacker could execute arbitrary code with the privileges of the user invoking the program. (CVE-2006-5925) Jakub Wilk discovered a logic error in Elinks, leading to a buffer overflow. If a user were tricked into viewing a malicious website, a remote attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2008-7224)