Gentoo Archives: gentoo-announce

From: Sune Kloppenborg Jeppesen <jaervosz@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200510-15 ] Lynx: Buffer overflow in NNTP processing
Date: Mon, 17 Oct 2005 15:30:51
Message-Id: 200510171703.08805.jaervosz@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200510-15
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Lynx: Buffer overflow in NNTP processing
9 Date: October 17, 2005
10 Bugs: #108451
11 ID: 200510-15
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Lynx contains a buffer overflow that may be exploited to execute
19 arbitrary code.
20
21 Background
22 ==========
23
24 Lynx is a text-mode browser for the World Wide Web. It supports
25 multiple URL types, including HTTP and NNTP URLs.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 www-client/lynx < 2.8.5-r1 >= 2.8.5-r1
34
35 Description
36 ===========
37
38 When accessing a NNTP URL, Lynx connects to a NNTP server and retrieves
39 information about the available articles in the target newsgroup. Ulf
40 Harnhammar discovered a buffer overflow in a function that handles the
41 escaping of special characters.
42
43 Impact
44 ======
45
46 An attacker could setup a malicious NNTP server and entice a user to
47 access it using Lynx (either by creating NNTP links on a web page or by
48 forcing a redirect for Lynx users). The data returned by the NNTP
49 server would trigger the buffer overflow and execute arbitrary code
50 with the rights of the user running Lynx.
51
52 Workaround
53 ==========
54
55 There is no known workaround at this time.
56
57 Resolution
58 ==========
59
60 All Lynx users should upgrade to the latest version:
61
62 # emerge --sync
63 # emerge --ask --oneshot --verbose ">=www-client/lynx-2.8.5-r1"
64
65 References
66 ==========
67
68 [ 1 ] CAN-2005-3120
69 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3120
70
71 Availability
72 ============
73
74 This GLSA and any updates to it are available for viewing at
75 the Gentoo Security Website:
76
77 http://security.gentoo.org/glsa/glsa-200510-15.xml
78
79 Concerns?
80 =========
81
82 Security is a primary focus of Gentoo Linux and ensuring the
83 confidentiality and security of our users machines is of utmost
84 importance to us. Any security concerns should be addressed to
85 security@g.o or alternatively, you may file a bug at
86 http://bugs.gentoo.org.
87
88 License
89 =======
90
91 Copyright 2005 Gentoo Foundation, Inc; referenced text
92 belongs to its owner(s).
93
94 The contents of this document are licensed under the
95 Creative Commons - Attribution / Share Alike license.
96
97 http://creativecommons.org/licenses/by-sa/2.0