-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ OpenPKG Security Advisory The OpenPKG Project http://www.openpkg.org/security.html http://www.openpkg.org openpkg-security@xxxxxxxxxxx openpkg@xxxxxxxxxxx OpenPKG-SA-2005.026 03-Dec-2005 ________________________________________________________________________ Package: lynx Vulnerability: command injection OpenPKG Specific: no Affected Releases: Affected Packages: Corrected Packages: OpenPKG CURRENT <= lynx-2.8.5-20051030 >= lynx-2.8.5.5-20051203 OpenPKG 2.5 <= lynx-2.8.5-2.5.0 >= lynx-2.8.5-2.5.1 OpenPKG 2.4 <= lynx-2.8.5-2.4.0 >= lynx-2.8.5-2.4.1 OpenPKG 2.3 <= lynx-2.8.5-2.3.0 >= lynx-2.8.5-2.3.1 Description: According to a iDEFENSE security advisory [0], a command injection vulnerability exists in the Lynx [2] WWW textual client. The vulnerability could allow attackers to execute arbitrary commands with the privileges of the underlying user. The problem specifically exists within the feature to execute local "cgi-bin" programs via the "lynxcgi:" URI handler. The Common Vulnerabilities and Exposures (CVE) project assigned the id CVE-2005-2929 [3] to the problem. Additionally, according to a security advisory from Ulf Harnhammar [1], a stack-based buffer overflow in the "HTrjis" function in Lynx allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters. The Common Vulnerabilities and Exposures (CVE) project assigned the id CVE-2005-3120 [4] to the problem. ________________________________________________________________________ References: [0] http://www.idefense.com/application/poi/display?id=338 [1] http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038019.html [2] http://lynx.isc.org/ [3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2929 [4] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3120 ________________________________________________________________________ For security reasons, this advisory was digitally signed with the OpenPGP public key "OpenPKG <openpkg@xxxxxxxxxxx>" (ID 63C4CB9F) of the OpenPKG project which you can retrieve from http://pgp.openpkg.org and hkp://pgp.openpkg.org. Follow the instructions on http://pgp.openpkg.org/ for details on how to verify the integrity of this advisory. ________________________________________________________________________ -----BEGIN PGP SIGNATURE----- Comment: OpenPKG <openpkg@xxxxxxxxxxx> iD8DBQFDkaokgHWT4GPEy58RAnurAJ9k6+9V7BtgDG6PmJ4FXgV8+urLYQCgueUG XQSysqWKUgxnq/NW+k/BQ3A= =x+XU -----END PGP SIGNATURE-----