Lucene search

K
ubuntuUbuntuUSN-851-1
HistoryOct 21, 2009 - 12:00 a.m.

Elinks vulnerabilities

2009-10-2100:00:00
ubuntu.com
28

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.6 High

AI Score

Confidence

Low

0.843 High

EPSS

Percentile

98.5%

Releases

  • Ubuntu 6.06

Packages

  • elinks -

Details

Teemu Salmela discovered that Elinks did not properly validate input when
processing smb:// URLs. If a user were tricked into viewing a malicious
website and had smbclient installed, a remote attacker could execute
arbitrary code with the privileges of the user invoking the program.
(CVE-2006-5925)

Jakub Wilk discovered a logic error in Elinks, leading to a buffer
overflow. If a user were tricked into viewing a malicious website, a remote
attacker could cause a denial of service via application crash, or possibly
execute arbitrary code with the privileges of the user invoking the
program. (CVE-2008-7224)

OSVersionArchitecturePackageVersionFilename
Ubuntu6.06noarchelinks-lite< 0.10.6-1ubuntu3.4UNKNOWN
Ubuntu6.06noarchelinks< 0.10.6-1ubuntu3.4UNKNOWN

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.6 High

AI Score

Confidence

Low

0.843 High

EPSS

Percentile

98.5%