Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CentOS Update for lynx CESA-2008:0965 centos4 i386

Information

Severity

Severity

Critical

Family

Family

CentOS Local Security Checks

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

13 years ago

Modified

Modified

5 years ago

Summary

Check for the Version of lynx

Insight

Insight

Lynx is a text-based Web browser. An arbitrary command execution flaw was found in the Lynx &quot lynxcgi:&quot URI handler. An attacker could create a web page redirecting to a malicious URL that could execute arbitrary code as the user running Lynx in the non-default &quot Advanced&quot user mode. (CVE-2008-4690) Note: In these updated lynx packages, Lynx will always prompt users before loading a &quot lynxcgi:&quot URI. Additionally, the default lynx.cfg configuration file now marks all &quot lynxcgi:&quot URIs as untrusted by default. A flaw was found in a way Lynx handled &quot .mailcap&quot and &quot .mime.types&quot configuration files. Files in the browser's current working directory were opened before those in the user's home directory. A local attacker, able to convince a user to run Lynx in a directory under their control, could possibly execute arbitrary commands as the user running Lynx. (CVE-2006-7234) All users of Lynx are advised to upgrade to this updated package, which contains backported patches correcting these issues.

Affected Software

Affected Software

lynx on CentOS 4

Solution

Solution

Please Install the Updated Packages.

Common Vulnerabilities and Exposures (CVE)