Vulnerability Name: CVE-2005-2929 (CCN-23119) Assigned: 2005-11-11 Published: 2005-11-11 Updated: 2018-10-19 Summary: Lynx 2.8.5, and other versions before 2.8.6dev.15, allows remote attackers to execute arbitrary commands via (1) lynxcgi:, (2) lynxexec, and (3) lynxprog links, which are not properly restricted in the default configuration in some environments. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-264 Vulnerability Consequences: Gain Access References: Source: SCO Type: UNKNOWNSCOSA-2006.7 Source: SCO Type: UNKNOWNSCOSA-2005.55 Source: CCN Type: iDEFENSE Security Advisory 11.11.05Multiple Vendor Lynx Command Injection Vulnerability Source: CCN Type: Full-Disclosure Mailing List, Fri Oct 07 2005 - 04:32:45 CDTiDefense Security Advisory 11.11.05: Multiple Vendor Lynx Command Injection Vulnerability Source: MITRE Type: CNACVE-2005-2929 Source: CCN Type: Lynx Web siteLynx Information Source: CCN Type: RHSA-2005-839lynx security update Source: CCN Type: SA17372Lynx "lynxcgi:" URI Handler Arbitrary Command Execution Source: SECUNIA Type: Vendor Advisory17372 Source: SECUNIA Type: Vendor Advisory17512 Source: SECUNIA Type: Vendor Advisory17546 Source: SECUNIA Type: Vendor Advisory17556 Source: SECUNIA Type: Vendor Advisory17576 Source: SECUNIA Type: Vendor Advisory17666 Source: SECUNIA Type: Vendor Advisory17757 Source: SECUNIA Type: Vendor Advisory18051 Source: SECUNIA Type: Vendor Advisory18376 Source: CCN Type: SA18659Avaya Intuity Audix Lynx Arbitrary Command Execution Source: SECUNIA Type: Vendor Advisory18659 Source: SREASON Type: UNKNOWN173 Source: CCN Type: SECTRACK ID: 1015195Lynx `lynxcgt:` Handler Configuration Bug Lets Remote Users Execute Arbitrary Commands Source: SECTRACK Type: UNKNOWN1015195 Source: CONFIRM Type: UNKNOWNhttp://support.avaya.com/elmodocs2/security/ASA-2006-035.htm Source: CCN Type: ASA-2006-035Lynx Command Injection (SCOSA-2005.55) Source: CCN Type: GLSA-200511-09Lynx: Arbitrary command execution Source: GENTOO Type: UNKNOWNGLSA-200511-09 Source: CCN Type: GLSA-200909-15Lynx: Arbitrary command execution Source: IDEFENSE Type: Patch, Vendor Advisory20051110 Multiple Vendor Lynx Command Injection Vulnerability Source: MANDRIVA Type: UNKNOWNMDKSA-2005:211 Source: CCN Type: OpenPKG-SA-2005.026Lynx Source: OPENPKG Type: UNKNOWNOpenPKG-SA-2005.026 Source: REDHAT Type: UNKNOWNRHSA-2005:839 Source: FEDORA Type: UNKNOWNFLSA:152832 Source: BID Type: UNKNOWN15395 Source: CCN Type: BID-15395Lynx URI Handlers Arbitrary Command Execution Vulnerability Source: VUPEN Type: Vendor AdvisoryADV-2005-2394 Source: XF Type: UNKNOWNlynx-lynxcgi-command-execute(23119) Source: XF Type: UNKNOWNlynx-lynxcgi-command-execute(23119) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:9712 Vulnerable Configuration: Configuration 1 :cpe:/a:university_of_kansas:lynx:2.8.5:*:*:*:*:*:*:* OR cpe:/a:university_of_kansas:lynx:2.8.6:*:*:*:*:*:*:* OR cpe:/a:university_of_kansas:lynx:2.8.6_dev13:*:*:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:lynx:lynx:2.8.5:dev.10:*:*:*:*:*:* AND cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:2.5:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1::x86-64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.mitre.oval:def:9712 V Lynx 2.8.5, and other versions before 2.8.6dev.15, allows remote attackers to execute arbitrary commands via (1) lynxcgi:, (2) lynxexec, and (3) lynxprog links, which are not properly restricted in the default configuration in some environments. 2013-04-29 oval:com.redhat.rhsa:def:20050839 P RHSA-2005:839: lynx security update (Critical) 2005-11-11
BACK
university_of_kansas lynx 2.8.5
university_of_kansas lynx 2.8.6
university_of_kansas lynx 2.8.6_dev13
lynx lynx 2.8.5 dev.10
openpkg openpkg current
gentoo linux *
mandrakesoft mandrake linux corporate server 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
mandrakesoft mandrake linux 10.1
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
mandrakesoft mandrake multi network firewall 2.0
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 2006
openpkg openpkg 2.5
mandrakesoft mandrake linux 10.1
mandrakesoft mandrake linux 2006
mandrakesoft mandrake linux corporate server 3.0
mandrakesoft mandrake linux corporate server 2.1