CentOS 4 : elinks (CESA-2006:0742)

high Nessus Plugin ID 37097

Synopsis

The remote CentOS host is missing a security update.

Description

An updated elinks package that corrects a security vulnerability is now available for Red Hat Enterprise Linux 4.

This update has been rated as having critical security impact by the Red Hat Security Response Team.

Elinks is a text mode Web browser used from the command line that supports rendering modern web pages.

An arbitrary file access flaw was found in the Elinks SMB protocol handler. A malicious web page could have caused Elinks to read or write files with the permissions of the user running Elinks.
(CVE-2006-5925)

All users of Elinks are advised to upgrade to this updated package, which resolves this issue by removing support for the SMB protocol from Elinks.

Note: this issue did not affect the Elinks package shipped with Red Hat Enterprise Linux 3, or the Links package shipped with Red Hat Enterprise Linux 2.1.

Solution

Update the affected elinks package.

See Also

http://www.nessus.org/u?6186841e

http://www.nessus.org/u?b085ba6d

http://www.nessus.org/u?0dab7d9c

Plugin Details

Severity: High

ID: 37097

File Name: centos_RHSA-2006-0742.nasl

Version: 1.12

Type: local

Agent: unix

Published: 4/23/2009

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:centos:centos:4, p-cpe:/a:centos:centos:elinks

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Patch Publication Date: 11/15/2006

Vulnerability Publication Date: 11/15/2006

Reference Information

CVE: CVE-2006-5925

RHSA: 2006:0742