[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2008-4690Date: (C)2008-10-22   (M)2023-12-22


lynx 2.8.6dev.15 and earlier, when advanced mode is enabled and lynx is configured as a URL handler, allows remote attackers to execute arbitrary commands via a crafted lynxcgi: URL, a related issue to CVE-2005-2929. NOTE: this might only be a vulnerability in limited deployments that have defined a lynxcgi: handler.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 10.0
Exploit Score: 10.0
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1021105
SECUNIA-32416
SECUNIA-32967
SECUNIA-33568
FEDORA-2008-9550
FEDORA-2008-9597
MDVSA-2008:217
MDVSA-2008:218
RHSA-2008:0965
SUSE-SR:2009:002
http://www.openwall.com/lists/oss-security/2008/10/09/2
lynx-lynxcgi-code-execution(46228)
oval:org.mitre.oval:def:11204

OVAL    1
oval:org.secpod.oval:def:301478

© SecPod Technologies