Vulnerability CVE-2008-4690


Published: 2008-10-22   Modified: 2012-02-12

Description:
lynx 2.8.6dev.15 and earlier, when advanced mode is enabled and lynx is configured as a URL handler, allows remote attackers to execute arbitrary commands via a crafted lynxcgi: URL, a related issue to CVE-2005-2929. NOTE: this might only be a vulnerability in limited deployments that have defined a lynxcgi: handler.

Type:

CWE-noinfo

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
LYNX -> LYNX 

 References:
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00143.html
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00066.html
http://xforce.iss.net/xforce/xfdb/46228
http://www.securitytracker.com/id?1021105
http://www.redhat.com/support/errata/RHSA-2008-0965.html
http://www.openwall.com/lists/oss-security/2008/10/09/2
http://www.mandriva.com/security/advisories?name=MDVSA-2008:218
http://www.mandriva.com/security/advisories?name=MDVSA-2008:217
http://secunia.com/advisories/33568
http://secunia.com/advisories/32967
http://secunia.com/advisories/32416
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11204
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html

Copyright 2024, cxsecurity.com

 

Back to Top