lynx 2.8.6dev.15 and earlier, when advanced mode is enabled and lynx is configured as a URL handler, allows remote attackers to execute arbitrary commands via a crafted lynxcgi: URL, a related issue to CVE-2005-2929. NOTE: this might only be a vulnerability in limited deployments that have defined a lynxcgi: handler.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html - | |
References | () http://secunia.com/advisories/32416 - Vendor Advisory | |
References | () http://secunia.com/advisories/32967 - | |
References | () http://secunia.com/advisories/33568 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2008:217 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2008:218 - | |
References | () http://www.openwall.com/lists/oss-security/2008/10/09/2 - | |
References | () http://www.redhat.com/support/errata/RHSA-2008-0965.html - Vendor Advisory | |
References | () http://www.securitytracker.com/id?1021105 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/46228 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11204 - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00066.html - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00143.html - |
Information
Published : 2008-10-22 18:00
Updated : 2024-11-21 00:52
NVD link : CVE-2008-4690
Mitre link : CVE-2008-4690
CVE.ORG link : CVE-2008-4690
JSON object : View
Products Affected
lynx
- lynx
CWE