Lucene search

K
centosCentOS ProjectCESA-2005:839
HistoryNov 12, 2005 - 1:33 a.m.

lynx security update

2005-11-1201:33:47
CentOS Project
lists.centos.org
54

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.018 Low

EPSS

Percentile

88.2%

CentOS Errata and Security Advisory CESA-2005:839

Lynx is a text-based Web browser.

An arbitrary command execute bug was found in the lynx “lynxcgi:” URI
handler. An attacker could create a web page redirecting to a malicious URL
which could execute arbitrary code as the user running lynx. The Common
Vulnerabilities and Exposures project assigned the name CVE-2005-2929 to
this issue.

Users should update to this erratum package, which contains a backported
patch to correct this issue.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-November/074565.html
https://lists.centos.org/pipermail/centos-announce/2005-November/074566.html
https://lists.centos.org/pipermail/centos-announce/2005-November/074568.html
https://lists.centos.org/pipermail/centos-announce/2005-November/074569.html
https://lists.centos.org/pipermail/centos-announce/2005-November/074570.html
https://lists.centos.org/pipermail/centos-announce/2005-November/074571.html
https://lists.centos.org/pipermail/centos-announce/2005-November/074573.html
https://lists.centos.org/pipermail/centos-announce/2005-November/074574.html
https://lists.centos.org/pipermail/centos-announce/2005-November/074575.html

Affected packages:
lynx

Upstream details at:
https://access.redhat.com/errata/RHSA-2005:839

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.018 Low

EPSS

Percentile

88.2%