Package: lynx-cur Version: 2.8.7dev1-1 Severity: grave Tags: security Justification: user security hole
Lynx attempts to use the .mime.types and .mailcap files located in the current directory: $ strace lynx -dump 2>&1 | grep '^open("[^/]' open(".mailcap", O_RDONLY) = -1 ENOENT (No such file or directory) open(".mime.types", O_RDONLY) = -1 ENOENT (No such file or directory) $ This allows an attacker to cause lynx to execute arbitrary shell code when a user runs lynx while visiting a directory with attacker-provided contents. -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing') Architecture: i386 (x86_64) Shell: /bin/sh linked to /bin/dash Kernel: Linux 2.6.18 Locale: LANG=C, LC_CTYPE=pl_PL.UTF-8 (charmap=UTF-8) Versions of packages lynx-cur depends on: ii debconf [debconf-2.0] 1.5.8 Debian configuration management sy ii libc6 2.3.6.ds1-4 GNU C Library: Shared libraries ii libgnutls13 1.4.4-1 the GNU TLS library - runtime libr ii libncursesw5 5.5-5 Shared libraries for terminal hand ii zlib1g 1:1.2.3-13 compression library - runtime Versions of packages lynx-cur recommends: ii mime-support 3.37-1 MIME files 'mime.types' & 'mailcap -- debconf information: * lynx-cur/defaulturl: http://www.google.pl/ lynx-cur/etc_lynx.cfg: -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]