[CLA-2003:720] Conectiva Security Announcement - lynx

From: Conectiva Updates (secureat_private)
Date: Mon Aug 11 2003 - 14:48:03 PDT

  • Next message: at4r ins4n3: "KaHT II - Massive RPC Dcom exploit.."

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - --------------------------------------------------------------------------
    CONECTIVA LINUX SECURITY ANNOUNCEMENT 
    - --------------------------------------------------------------------------
    
    PACKAGE   : lynx
    SUMMARY   : CRLF injection local vulnerability
    DATE      : 2003-08-11 18:47:00
    ID        : CLA-2003:720
    RELEVANT
    RELEASES  : 7.0, 8
    
    - -------------------------------------------------------------------------
    
    DESCRIPTION
     Lynx is a text terminal based web browser.
     
     Ulf Harnhammar reported[1] a CRLF (Carriage Return, Line Feed)
     injection vulnerability in lynx. When handling a URL supplied through
     the command line, lynx does not filter out characters such as spaces,
     CR, LF, etc, which allows an attacker to inject HTTP headers and
     cause program misbehavior[2] by using a specially crafted URL.
     
     The Common Vulnerabilities and Exposures project (cve.mitre.org) has
     assigned the name CAN-2002-1405 to this issue[3].
     
     The package distributed with Conectiva Linux 9 (lynx-2.8.4-25963cl)
     already contains a fix and is not vulnerable to this problem.
    
    
    SOLUTION
     All lynx users should upgrade.
     
     
     REFERENCES:
     1.http://marc.theaimsgroup.com/?l=bugtraq&m=102978118411977&w=2
     2.http://marc.theaimsgroup.com/?l=bugtraq&m=103003793418021&w=2
     3.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1405
    
    
    UPDATED PACKAGES
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/lynx-2.8.4-1U70_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/lynx-doc-2.8.4-1U70_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/lynx-2.8.4-1U70_1cl.src.rpm
    ftp://atualizacoes.conectiva.com.br/8/RPMS/lynx-2.8.4-4U80_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/8/RPMS/lynx-doc-2.8.4-4U80_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/8/SRPMS/lynx-2.8.4-4U80_1cl.src.rpm
    
    
    ADDITIONAL INSTRUCTIONS
     The apt tool can be used to perform RPM packages upgrades:
    
     - run:                 apt-get update
     - after that, execute: apt-get upgrade
    
     Detailed instructions reagarding the use of apt and upgrade examples 
     can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en
    
    - -------------------------------------------------------------------------
    All packages are signed with Conectiva's GPG key. The key and instructions
    on how to import it can be found at 
    http://distro.conectiva.com.br/seguranca/chave/?idioma=en
    Instructions on how to check the signatures of the RPM packages can be
    found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en
    
    - -------------------------------------------------------------------------
    All our advisories and generic update instructions can be viewed at
    http://distro.conectiva.com.br/atualizacoes/?idioma=en
    
    - -------------------------------------------------------------------------
    Copyright (c) 2003 Conectiva Inc.
    http://www.conectiva.com
    
    - -------------------------------------------------------------------------
    subscribe: conectiva-updates-subscribeat_private
    unsubscribe: conectiva-updates-unsubscribeat_private
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.6 (GNU/Linux)
    Comment: For info see http://www.gnupg.org
    
    iD8DBQE/OA8S42jd0JmAcZARAii3AKDZidansYEKYf8xSJc4pxAcLuIb8wCfVrx+
    h8yMrRGfIyQi9Pm+pmtlyW4=
    =DXVd
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Mon Aug 11 2003 - 15:03:41 PDT