Lucene search

K

Debian Security Advisory DSA 876-1 (lynx-ssl)

🗓️ 17 Jan 2008 00:00:00Reported by Copyright (c) 2005 E-Soft Inc. http://www.securityspace.comType 
openvas
 openvas
🔗 plugins.openvas.org👁 10 Views

Debian Security Advisory DSA 876-1 (lynx-ssl) - Buffer overflow in lynx-ss

Show more
Related
Code
ReporterTitlePublishedViews
Family
OSV
lynx-ssl - buffer overflow
27 Oct 200500:00
osv
OSV
RHSA-2005:803 Red Hat Security Advisory: lynx security update
15 Sep 202415:51
osv
OSV
lynx - buffer overflow
27 Oct 200500:00
osv
OSV
lynx-cur - several vulnerabilities
1 Jun 200600:00
osv
securityvulns
[USN-206-1] Lynx vulnerability
19 Oct 200500:00
securityvulns
Tenable Nessus
RHEL 4 : lynx (RHSA-2005:803)
19 Oct 200500:00
nessus
Tenable Nessus
CentOS 3 / 4 : lynx (CESA-2005:803)
3 Jul 200600:00
nessus
Tenable Nessus
Debian DSA-874-1 : lynx - buffer overflow
14 Oct 200600:00
nessus
Tenable Nessus
Debian DSA-876-1 : lynx-ssl - buffer overflow
14 Oct 200600:00
nessus
Tenable Nessus
Fedora Core 4 : lynx-2.8.5-23.1 (2005-994)
19 Oct 200500:00
nessus
Rows per page
# OpenVAS Vulnerability Test
# $Id: deb_876_1.nasl 6616 2017-07-07 12:10:49Z cfischer $
# Description: Auto-generated from advisory DSA 876-1
#
# Authors:
# Thomas Reinke <[email protected]>
#
# Copyright:
# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com
# Text descriptions are largerly excerpted from the referenced
# advisory, and are Copyright (c) the respective author(s)
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#

include("revisions-lib.inc");
tag_solution = "For the stable distribution (sarge) this problem has been fixed in
version 2.8.5-2sarge1 of lynx.

For the unstable distribution (sid) this problem will be fixed soon.

We recommend that you upgrade your lynx-ssl package.

 https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20876-1";
tag_summary = "The remote host is missing an update to lynx-ssl
announced via advisory DSA 876-1.

Ulf Härnhammar discovered a buffer overflow in lynx, a text-mode
browser for the WWW that can be remotely exploited.  During the
handling of Asian characters when connecting to an NNTP server lynx
can be tricked to write past the boundary of a buffer which can lead
to the execution of arbitrary code.

For the old stable distribution (woody) this problem has been fixed in
version 2.8.4.1b-3.2.";


if(description)
{
 script_id(55752);
 script_version("$Revision: 6616 $");
 script_tag(name:"last_modification", value:"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $");
 script_tag(name:"creation_date", value:"2008-01-17 23:03:37 +0100 (Thu, 17 Jan 2008)");
 script_bugtraq_id(15117);
 script_cve_id("CVE-2005-3120");
 script_tag(name:"cvss_base", value:"7.5");
 script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_name("Debian Security Advisory DSA 876-1 (lynx-ssl)");



 script_category(ACT_GATHER_INFO);

 script_copyright("Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com");
 script_family("Debian Local Security Checks");
 script_dependencies("gather-package-list.nasl");
 script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages");
 script_tag(name : "solution" , value : tag_solution);
 script_tag(name : "summary" , value : tag_summary);
 script_tag(name:"qod_type", value:"package");
 script_tag(name:"solution_type", value:"VendorFix");
 exit(0);
}

#
# The script code starts here
#

include("pkg-lib-deb.inc");

res = "";
report = "";
if ((res = isdpkgvuln(pkg:"lynx-ssl", ver:"2.8.4.1b-3.2", rls:"DEB3.0")) != NULL) {
    report += res;
}

if (report != "") {
    security_message(data:report);
} else if (__pkg_match) {
    exit(99); # Not vulnerable.
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo