LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 21st, 2014
Linux Security Week: April 7th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Debian: New lynx-cur packages fix several vulnerabilities Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian Updated package.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1085-1                    security@debian.org
http://www.debian.org/security/                             Martin Schulze
June 1st, 2006                          http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : lynx-ssl
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE IDs        : CVE-2004-1617 CAN-2005-3120
BugTraq ID     : 11443
Debian Bug     : 296340


Several vulnerabilities have been discoverd in lynx, the popular
text-mode WWW browser.  The Common Vulnerabilities and Exposures
Project identifies the following vulnerabilities:

CVE-2004-1617

    Michal Zalewski discovered that lynx is not able to grok invalid
    HTML including a TEXTAREA tag with a large COLS value and a large
    tag name in an element that is not terminated, and loops forever
    trying to render the broken HTML.

CAN-2005-3120

    Ulf H�rnhammar discovered a buffer overflow that can be remotely
    exploited. During the handling of Asian characters when connecting
    to an NNTP server lynx can be tricked to write past the boundary
    of a buffer which can lead to the execution of arbitrary code.

For the old stable distribution (woody) these problems have been fixed in
version 2.8.5-2.5woody1.

For the stable distribution (sarge) these problems have been fixed in
version 2.8.6-9sarge1.

For the unstable distribution (sid) these problems will be fixed soon.

We recommend that you upgrade your lynx-cur package.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1.dsc
      Size/MD5 checksum:      640 e6f29a507e298508f72eb24c21b1bdde
    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1.diff.gz
      Size/MD5 checksum:   634446 19fad72695b064d6a6e893bb1ea1006f
    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5.orig.tar.gz
      Size/MD5 checksum:  2557113 81764528e685747ec00e7e23f18fd6d3

  Architecture independent components:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur-wrapper_2.8.5-2.5woody1_all.deb
      Size/MD5 checksum:   161086 eec2317cf887d4d8762866c26b6783ad

  Alpha architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_alpha.deb
      Size/MD5 checksum:  1419168 50e1763a404316ec33802c77f55180ee

  ARM architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_arm.deb
      Size/MD5 checksum:  1292792 e922a7feefe43f2e0bff7713ed292403

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_i386.deb
      Size/MD5 checksum:  1252720 667586b0cb239a23efaa03a45e44ba41

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_ia64.deb
      Size/MD5 checksum:  1573108 88a04e9032f61055812cbbdc5b66ebcc

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_hppa.deb
      Size/MD5 checksum:  1361852 2cf253de737b654ee1cce1b13b43639a

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_m68k.deb
      Size/MD5 checksum:  1212894 07b758555efaeff043595c2338dece95

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_mips.deb
      Size/MD5 checksum:  1314946 b737ed585f45a69a19f2f5314509918b

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_mipsel.deb
      Size/MD5 checksum:  1310968 a82a5f1be84d27067c9b63b8af540dd6

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_powerpc.deb
      Size/MD5 checksum:  1299254 a5498c2256c092e2a8ebef012df0f4b2

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_s390.deb
      Size/MD5 checksum:  1271028 44125629519a455e212ae5397071e7bd

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_sparc.deb
      Size/MD5 checksum:  1297518 33c40521d500228c1973f4e67b424f40


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1.dsc
      Size/MD5 checksum:      667 af1fc2fa2f7673145760fe57c0aea8fb
    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1.diff.gz
      Size/MD5 checksum:  5605374 2deb21954ef7e8e39dfd26abdf1f2e64
    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6.orig.tar.gz
      Size/MD5 checksum:  3023366 02f47f32cb2b96ea5dc1bd335e19ef4a

  Architecture independent components:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur-wrapper_2.8.6-9sarge1_all.deb
      Size/MD5 checksum:    12296 a615ca6b426011b3f40cd20ad48cb2cb

  Alpha architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_alpha.deb
      Size/MD5 checksum:  2017328 ff45d271444be4f6560372dfb0b274b2

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_amd64.deb
      Size/MD5 checksum:  1901508 bb17d7c45e77910289765aec3f77c30c

  ARM architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_arm.deb
      Size/MD5 checksum:  1871322 2555b982f070c91e00348370eaa48244

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_i386.deb
      Size/MD5 checksum:  1876050 4dd3066564cd0fc919bc326c51686f26

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_ia64.deb
      Size/MD5 checksum:  2155322 3736a40dd67ccba9a9f90e44f6a8ada7

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_hppa.deb
      Size/MD5 checksum:  1930998 6402a13b8834d92d2e01a306eb374d0f

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_m68k.deb
      Size/MD5 checksum:  1797494 01b7c40f1acfcc91c2ac467c867503e9

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_mips.deb
      Size/MD5 checksum:  1914628 87ae23a7369ea464d3840653ac1522b6

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_mipsel.deb
      Size/MD5 checksum:  1911160 8cff5b755921183a11062644001e0759

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_powerpc.deb
      Size/MD5 checksum:  1898106 e907c041632012ad322f3c701b6696cd

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_s390.deb
      Size/MD5 checksum:  1886340 e2f640b6e388de70f160c6fe68dff134

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_sparc.deb
      Size/MD5 checksum:  1878152 f0a57a2d5ac589bec4e7994bc3ac2030


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Fixing OpenSSL's Heartbleed flaw will take MONTHS, warns Secunia
Even the most secure cloud storage may not be so secure, study finds
Targeted Attack Uses Heartbleed to Hijack VPN Sessions
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.