elinks is vulnerable to arbitrary code execution. The vulnerability exists as it was discovered that ELinks tried to load translation files using relative paths. A local attacker able to trick a victim into running ELinks in a folder containing specially-crafted translation files could use this flaw to confuse the victim via incorrect translations, or cause ELinks to crash and possibly execute arbitrary code via embedded formatting sequences in translated messages.
CPE | Name | Operator | Version |
---|---|---|---|
elinks | eq | 0.11.1__5.1.el5 | |
elinks | eq | 0.11.1__5.1.0.1.el5 | |
elinks | eq | 0.11.1__5.1.el5 | |
elinks | eq | 0.11.1__5.1.0.1.el5 |
bugs.debian.org/cgi-bin/bugreport.cgi?bug=417789
osvdb.org/35668
secunia.com/advisories/25169
secunia.com/advisories/25198
secunia.com/advisories/25255
secunia.com/advisories/25550
security.gentoo.org/glsa/glsa-200706-03.xml
www.redhat.com/security/updates/classification/#important
www.securityfocus.com/bid/23844
www.trustix.org/errata/2007/0017/
www.ubuntu.com/usn/usn-457-1
www.vupen.com/english/advisories/2007/1686
access.redhat.com/errata/RHSA-2009:1471
bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235411
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9741