Rapid7 Vulnerability & Exploit Database

RHSA-2008:0965: lynx security update

Back to Search

RHSA-2008:0965: lynx security update

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
10/22/2008
Created
07/25/2018
Added
02/22/2009
Modified
07/04/2017

Description

Lynx is a text-based Web browser.An arbitrary command execution flaw was found in the Lynx "lynxcgi:" URIhandler. An attacker could create a web page redirecting to a malicious URLthat could execute arbitrary code as the user running Lynx in thenon-default "Advanced" user mode. (CVE-2008-4690)Note: In these updated lynx packages, Lynx will always prompt users beforeloading a "lynxcgi:" URI. Additionally, the default lynx.cfg configurationfile now marks all "lynxcgi:" URIs as untrusted by default.A flaw was found in a way Lynx handled ".mailcap" and ".mime.types"configuration files. Files in the browser's current working directory wereopened before those in the user's home directory. A local attacker, able toconvince a user to run Lynx in a directory under their control, couldpossibly execute arbitrary commands as the user running Lynx. (CVE-2006-7234)All users of Lynx are advised to upgrade to this updated package, whichcontains backported patches correcting these issues.

Solution(s)

  • redhat-upgrade-lynx

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;