Package: lynx-cur
Version: 2.8.7dev1-1
Severity: grave
Tags: security
Justification: user security hole

Lynx attempts to use the .mime.types and .mailcap files located in the
current directory:

$ strace lynx -dump 2>&1 | grep '^open("[^/]'
open(".mailcap", O_RDONLY)              = -1 ENOENT (No such file or directory)
open(".mime.types", O_RDONLY)           = -1 ENOENT (No such file or directory)
$

This allows an attacker to cause lynx to execute arbitrary shell code when a
user runs lynx while visiting a directory with attacker-provided contents.


-- System Information:
Debian Release: testing/unstable
 APT prefers testing
 APT policy: (500, 'testing')
Architecture: i386 (x86_64)
Shell:  /bin/sh linked to /bin/dash
Kernel: Linux 2.6.18
Locale: LANG=C, LC_CTYPE=pl_PL.UTF-8 (charmap=UTF-8)

Versions of packages lynx-cur depends on:
ii  debconf [debconf-2.0]        1.5.8       Debian configuration management sy
ii  libc6                        2.3.6.ds1-4 GNU C Library: Shared libraries
ii  libgnutls13                  1.4.4-1     the GNU TLS library - runtime libr
ii  libncursesw5                 5.5-5       Shared libraries for terminal hand
ii  zlib1g                       1:1.2.3-13  compression library - runtime

Versions of packages lynx-cur recommends:
ii  mime-support                  3.37-1     MIME files 'mime.types' & 'mailcap

-- debconf information:
* lynx-cur/defaulturl: http://www.google.pl/
 lynx-cur/etc_lynx.cfg:


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to