5.1 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
elinks is vulnerable to authentication bypass attacks. The vulnerability exists as the http_negotiate_create_context function in protocol/http/http_negotiate.c in ELinks 0.12 before 0.12pre6, when using HTTP Negotiate or GSS-Negotiate authentication, delegates user credentials through GSSAPI, which allows remote servers to authenticate as the client via the delegated credentials.
CPE | Name | Operator | Version |
---|---|---|---|
elinks | eq | 0.11.1__5.1.0.1.el5 | |
elinks | eq | 0.11.1__6.el5_4.1 | |
elinks | eq | 0.11.1__5.1.el5 |
bugzilla.elinks.cz/show_bug.cgi?id=1124
repo.or.cz/w/elinks.git/blobdiff/89056e21fc7ab8e1c2d4e06ec9d0c6d01e70669a..da18694ff7dd0b67dfcb3c417fb0579b1e7d02d7:/src/protocol/http/http_negotiate.c
rhn.redhat.com/errata/RHSA-2013-0250.html
secunia.com/advisories/51569
www.debian.org/security/2012/dsa-2592
www.mandriva.com/security/advisories?name=MDVSA-2013:075
www.securityfocus.com/bid/57065
access.redhat.com/security/updates/classification/#moderate
exchange.xforce.ibmcloud.com/vulnerabilities/80882
rhn.redhat.com/errata/RHSA-2013-0250.html