Lynx, lynx-ssl, and lynx-cur before 2.8.6dev.8 allow remote attackers to cause a denial of service (infinite loop) via a web page or HTML email that contains invalid HTML including (1) a TEXTAREA tag with a large COLS value and (2) a large tag name in an element that is not terminated, as demonstrated by mangleme. NOTE: a followup suggests that the relevant trigger for this issue is the large COLS value.
https://exchange.xforce.ibmcloud.com/vulnerabilities/17804
http://www.securityfocus.com/archive/1/435689/30/4740/threaded
http://www.debian.org/security/2006/dsa-1085
http://www.debian.org/security/2006/dsa-1077
http://www.debian.org/security/2006/dsa-1076
http://securitytracker.com/id?1011809
http://secunia.com/advisories/20383
http://marc.info/?l=bugtraq&m=109811406620511&w=2
http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027709.html