Vulnerability CVE-2004-1617


Published: 2004-10-18   Modified: 2012-02-12

Description:
Lynx, lynx-ssl, and lynx-cur before 2.8.6dev.8 allow remote attackers to cause a denial of service (infinite loop) via a web page or HTML email that contains invalid HTML including (1) a TEXTAREA tag with a large COLS value and (2) a large tag name in an element that is not terminated, as demonstrated by mangleme. NOTE: a followup suggests that the relevant trigger for this issue is the large COLS value.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
University of kansas -> LYNX 

 References:
http://lcamtuf.coredump.cx/mangleme/gallery/
http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027709.html
http://marc.info/?l=bugtraq&m=109811406620511&w=2
http://securitytracker.com/id?1011809
http://www.debian.org/security/2006/dsa-1076
http://www.debian.org/security/2006/dsa-1077
http://www.debian.org/security/2006/dsa-1085
http://www.securityfocus.com/archive/1/435689/30/4740/threaded
http://www.securityfocus.com/bid/11443
https://exchange.xforce.ibmcloud.com/vulnerabilities/17804

Copyright 2024, cxsecurity.com

 

Back to Top