Vulnerabilities > CVE-2008-4690 - Unspecified vulnerability in Lynx
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
lynx 2.8.6dev.15 and earlier, when advanced mode is enabled and lynx is configured as a URL handler, allows remote attackers to execute arbitrary commands via a crafted lynxcgi: URL, a related issue to CVE-2005-2929. NOTE: this might only be a vulnerability in limited deployments that have defined a lynxcgi: handler.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 176 |
Nessus
NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2008-0965.NASL description From Red Hat Security Advisory 2008:0965 : An updated lynx package that corrects two security issues is now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. Lynx is a text-based Web browser. An arbitrary command execution flaw was found in the Lynx last seen 2020-06-01 modified 2020-06-02 plugin id 67759 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67759 title Oracle Linux 3 / 4 / 5 : lynx (ELSA-2008-0965) NASL family SuSE Local Security Checks NASL id SUSE_LYNX-5720.NASL description This update of lynx fixes a security bug that can be exploited by remote attackers to execute arbitrary commands when advanced mode is enabled and lynx is used as URL handler (CVE-2008-4690) last seen 2020-06-01 modified 2020-06-02 plugin id 34984 published 2008-12-01 reporter This script is Copyright (C) 2008-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/34984 title openSUSE 10 Security Update : lynx (lynx-5720) NASL family Fedora Local Security Checks NASL id FEDORA_2008-9597.NASL description - Mon Nov 10 2008 Jiri Moskovcak <jmoskovc at redhat.com> - 2.8.6-12 - Fixed CVE-2008-4690 lynx: remote arbitrary command execution. via a crafted lynxcgi: URL (thoger) - Fri May 30 2008 Jiri Moskovcak <jmoskovc at redhat.com> - 2.8.6-11 - updated to latest upstream version 2.8.6rel5 - Resolves: #214205 - Wed Jan 9 2008 Jiri Moskovcak <jmoskovc at redhat.com> - 2.8.6-10 - added telnet, rsh, zip and unzip to BuildRequires - Resolves: #430508 - Wed Jan 9 2008 Jiri Moskovcak <jmoskovc at redhat.com> - 2.8.6-9 - fixed crash when using formatting character last seen 2020-06-01 modified 2020-06-02 plugin id 35017 published 2008-12-03 reporter This script is Copyright (C) 2008-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/35017 title Fedora 8 : lynx-2.8.6-12.fc8 (2008-9597) NASL family Fedora Local Security Checks NASL id FEDORA_2008-9550.NASL description - Mon Nov 10 2008 Jiri Moskovcak <jmoskovc at redhat.com> 2.8.6-17 - Fixed CVE-2008-4690 lynx: remote arbitrary command execution. via a crafted lynxcgi: URL (thoger) - Fri May 30 2008 Jiri Moskovcak <jmoskovc at redhat.com> 2.8.6-16 - updated to latest stable upstream version 2.8.6rel5 - Fri May 23 2008 Dennis Gilmore <dennis at ausil.us> - 2.8.6-15.1 - minor rebuild on sparc - Sat May 17 2008 Dennis Gilmore <dennis at ausil.us> - 2.8.6-15 - even with the patches it still built wrong in koji. - limit -j to 24 for sparc - Thu May 8 2008 Dennis Gilmore <dennis at ausil.us> - 2.8.6-14 - patch from ajax to fix parallel builds - additional patch from me for parallel builds - set default home page to start.fedoraproject.org Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 35016 published 2008-12-03 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/35016 title Fedora 9 : lynx-2.8.6-17.fc9 (2008-9550) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2008-0965.NASL description An updated lynx package that corrects two security issues is now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. Lynx is a text-based Web browser. An arbitrary command execution flaw was found in the Lynx last seen 2020-06-01 modified 2020-06-02 plugin id 34505 published 2008-10-28 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/34505 title RHEL 2.1 / 3 / 4 / 5 : lynx (RHSA-2008:0965) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2008-0965.NASL description An updated lynx package that corrects two security issues is now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. Lynx is a text-based Web browser. An arbitrary command execution flaw was found in the Lynx last seen 2020-06-01 modified 2020-06-02 plugin id 34503 published 2008-10-28 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/34503 title CentOS 3 / 4 / 5 : lynx (CESA-2008:0965) NASL family SuSE Local Security Checks NASL id SUSE_11_0_LYNX-081030.NASL description This update of lynx fixes a security bug that can be exploited by remote attackers to execute arbitrary commands when advanced mode is enabled and lynx is used as URL handler (CVE-2008-4690) last seen 2020-06-01 modified 2020-06-02 plugin id 40062 published 2009-07-21 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/40062 title openSUSE Security Update : lynx (lynx-275) NASL family Fedora Local Security Checks NASL id FEDORA_2008-9952.NASL description - Fri Nov 7 2008 Jiri Moskovcak <jmoskovc at redhat.com> - 2.8.6-18 - Fixed CVE-2008-4690 lynx: remote arbitrary command execution. via a crafted lynxcgi: URL (thoger) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 37326 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/37326 title Fedora 10 : lynx-2.8.6-18.fc10 (2008-9952) NASL family Scientific Linux Local Security Checks NASL id SL_20081027_LYNX_ON_SL3_X.NASL description An arbitrary command execution flaw was found in the Lynx last seen 2020-06-01 modified 2020-06-02 plugin id 60486 published 2012-08-01 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/60486 title Scientific Linux Security Update : lynx on SL3.x, SL4.x, SL5.x i386/x86_64 NASL family Mandriva Local Security Checks NASL id MANDRIVA_MDVSA-2008-218.NASL description A vulnerability was found in the Lynxcgi: URI handler that could allow an attacker to create a web page redirecting to a malicious URL that would execute arbitrary code as the user running Lynx, if they were using the non-default Advanced user mode (CVE-2008-4690). This update corrects these issues and, in addition, makes Lynx always prompt the user before loading a lynxcgi: URI. As well, the default lynx.cfg configuration file marks all lynxcgi: URIs as untrusted. last seen 2020-06-01 modified 2020-06-02 plugin id 38035 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/38035 title Mandriva Linux Security Advisory : lynx (MDVSA-2008:218) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200909-15.NASL description The remote host is affected by the vulnerability described in GLSA-200909-15 (Lynx: Arbitrary command execution) Clint Ruoho reported that the fix for CVE-2005-2929 (GLSA 200511-09) only disabled the lynxcgi:// handler when not using the advanced mode. Impact : A remote attacker can entice a user to access a malicious HTTP server, causing Lynx to execute arbitrary commands. NOTE: The advanced mode is not enabled by default. Successful exploitation requires the last seen 2020-06-01 modified 2020-06-02 plugin id 40962 published 2009-09-14 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/40962 title GLSA-200909-15 : Lynx: Arbitrary command execution
Oval
accepted | 2013-04-29T04:12:19.376-04:00 | ||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||
description | lynx 2.8.6dev.15 and earlier, when advanced mode is enabled and lynx is configured as a URL handler, allows remote attackers to execute arbitrary commands via a crafted lynxcgi: URL, a related issue to CVE-2005-2929. NOTE: this might only be a vulnerability in limited deployments that have defined a lynxcgi: handler. | ||||||||||||||||||||||||||||||||
family | unix | ||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:11204 | ||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||
submitted | 2010-07-09T03:56:16-04:00 | ||||||||||||||||||||||||||||||||
title | lynx 2.8.6dev.15 and earlier, when advanced mode is enabled and lynx is configured as a URL handler, allows remote attackers to execute arbitrary commands via a crafted lynxcgi: URL, a related issue to CVE-2005-2929. NOTE: this might only be a vulnerability in limited deployments that have defined a lynxcgi: handler. | ||||||||||||||||||||||||||||||||
version | 27 |
Redhat
advisories |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
rpms |
|
References
- http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
- http://secunia.com/advisories/32416
- http://secunia.com/advisories/32967
- http://secunia.com/advisories/33568
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:217
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:218
- http://www.openwall.com/lists/oss-security/2008/10/09/2
- http://www.redhat.com/support/errata/RHSA-2008-0965.html
- http://www.securitytracker.com/id?1021105
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46228
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11204
- https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00066.html
- https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00143.html