Lynx < 2.8.3pre5 Long URL Buffer Overflow

high Nessus Network Monitor Plugin ID 1738

Synopsis

The remote host is using Lynx as a web browser.

Description

The remote host is using Lynx as a web browser. The version used is vulnerable to several buffer overflow conditions which may allow an attacker to execute arbitrary code on this host by setting up a rogue web server and have a user of this host visit it.

Solution

Upgrade to Lynx 2.8.3pre5 or higher.

Plugin Details

Severity: High

ID: 1738

Family: Web Clients

Published: 8/20/2004

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.6

Temporal Score: 6.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:lynx:lynx

Reference Information

CVE: CVE-2000-0209

BID: 1012