CentOS Errata and Security Advisory CESA-2008:0965
Lynx is a text-based Web browser.
An arbitrary command execution flaw was found in the Lynx "lynxcgi:" URI handler. An attacker could create a web page redirecting to a malicious URL that could execute arbitrary code as the user running Lynx in the non-default "Advanced" user mode. (CVE-2008-4690)
Note: In these updated lynx packages, Lynx will always prompt users before loading a "lynxcgi:" URI. Additionally, the default lynx.cfg configuration file now marks all "lynxcgi:" URIs as untrusted by default.
A flaw was found in a way Lynx handled ".mailcap" and ".mime.types" configuration files. Files in the browser's current working directory were opened before those in the user's home directory. A local attacker, able to convince a user to run Lynx in a directory under their control, could possibly execute arbitrary commands as the user running Lynx. (CVE-2006-7234)
All users of Lynx are advised to upgrade to this updated package, which contains backported patches correcting these issues.
Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2008-October/027388.html http://lists.centos.org/pipermail/centos-announce/2008-October/027389.html http://lists.centos.org/pipermail/centos-announce/2008-October/027390.html http://lists.centos.org/pipermail/centos-announce/2008-October/027391.html http://lists.centos.org/pipermail/centos-announce/2008-October/027396.html http://lists.centos.org/pipermail/centos-announce/2008-October/027397.html http://lists.centos.org/pipermail/centos-announce/2008-October/027399.html http://lists.centos.org/pipermail/centos-announce/2008-October/027400.html http://lists.centos.org/pipermail/centos-announce/2008-October/027401.html http://lists.centos.org/pipermail/centos-announce/2008-October/027402.html
Affected packages: lynx
Upstream details at: https://rhn.redhat.com/errata/RHSA-2008-0965.html