Vulnerability Name: | CVE-2005-2929 (CCN-23119) |
Assigned: | 2005-11-11 |
Published: | 2005-11-11 |
Updated: | 2018-10-19 |
Summary: | Lynx 2.8.5, and other versions before 2.8.6dev.15, allows remote attackers to execute arbitrary commands via (1) lynxcgi:, (2) lynxexec, and (3) lynxprog links, which are not properly restricted in the default configuration in some environments. |
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-264
|
Vulnerability Consequences: | Gain Access |
References: | Source: SCO Type: UNKNOWN SCOSA-2006.7
Source: SCO Type: UNKNOWN SCOSA-2005.55
Source: CCN Type: iDEFENSE Security Advisory 11.11.05 Multiple Vendor Lynx Command Injection Vulnerability
Source: CCN Type: Full-Disclosure Mailing List, Fri Oct 07 2005 - 04:32:45 CDT iDefense Security Advisory 11.11.05: Multiple Vendor Lynx Command Injection Vulnerability
Source: MITRE Type: CNA CVE-2005-2929
Source: CCN Type: Lynx Web site Lynx Information
Source: CCN Type: RHSA-2005-839 lynx security update
Source: CCN Type: SA17372 Lynx "lynxcgi:" URI Handler Arbitrary Command Execution
Source: SECUNIA Type: Vendor Advisory 17372
Source: SECUNIA Type: Vendor Advisory 17512
Source: SECUNIA Type: Vendor Advisory 17546
Source: SECUNIA Type: Vendor Advisory 17556
Source: SECUNIA Type: Vendor Advisory 17576
Source: SECUNIA Type: Vendor Advisory 17666
Source: SECUNIA Type: Vendor Advisory 17757
Source: SECUNIA Type: Vendor Advisory 18051
Source: SECUNIA Type: Vendor Advisory 18376
Source: CCN Type: SA18659 Avaya Intuity Audix Lynx Arbitrary Command Execution
Source: SECUNIA Type: Vendor Advisory 18659
Source: SREASON Type: UNKNOWN 173
Source: CCN Type: SECTRACK ID: 1015195 Lynx `lynxcgt:` Handler Configuration Bug Lets Remote Users Execute Arbitrary Commands
Source: SECTRACK Type: UNKNOWN 1015195
Source: CONFIRM Type: UNKNOWN http://support.avaya.com/elmodocs2/security/ASA-2006-035.htm
Source: CCN Type: ASA-2006-035 Lynx Command Injection (SCOSA-2005.55)
Source: CCN Type: GLSA-200511-09 Lynx: Arbitrary command execution
Source: GENTOO Type: UNKNOWN GLSA-200511-09
Source: CCN Type: GLSA-200909-15 Lynx: Arbitrary command execution
Source: IDEFENSE Type: Patch, Vendor Advisory 20051110 Multiple Vendor Lynx Command Injection Vulnerability
Source: MANDRIVA Type: UNKNOWN MDKSA-2005:211
Source: CCN Type: OpenPKG-SA-2005.026 Lynx
Source: OPENPKG Type: UNKNOWN OpenPKG-SA-2005.026
Source: REDHAT Type: UNKNOWN RHSA-2005:839
Source: FEDORA Type: UNKNOWN FLSA:152832
Source: BID Type: UNKNOWN 15395
Source: CCN Type: BID-15395 Lynx URI Handlers Arbitrary Command Execution Vulnerability
Source: VUPEN Type: Vendor Advisory ADV-2005-2394
Source: XF Type: UNKNOWN lynx-lynxcgi-command-execute(23119)
Source: XF Type: UNKNOWN lynx-lynxcgi-command-execute(23119)
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:9712
|
Vulnerable Configuration: | Configuration 1: cpe:/a:university_of_kansas:lynx:2.8.5:*:*:*:*:*:*:*OR cpe:/a:university_of_kansas:lynx:2.8.6:*:*:*:*:*:*:*OR cpe:/a:university_of_kansas:lynx:2.8.6_dev13:*:*:*:*:*:*:* Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Configuration CCN 1: cpe:/a:lynx:lynx:2.8.5:dev.10:*:*:*:*:*:*AND cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:*OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*OR cpe:/a:openpkg:openpkg:2.5:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:10.1::x86-64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
Definition ID | Class | Title | Last Modified |
---|
oval:org.mitre.oval:def:9712 | V | Lynx 2.8.5, and other versions before 2.8.6dev.15, allows remote attackers to execute arbitrary commands via (1) lynxcgi:, (2) lynxexec, and (3) lynxprog links, which are not properly restricted in the default configuration in some environments. | 2013-04-29 | oval:com.redhat.rhsa:def:20050839 | P | RHSA-2005:839: lynx security update (Critical) | 2005-11-11 |
|
BACK |
university_of_kansas lynx 2.8.5
university_of_kansas lynx 2.8.6
university_of_kansas lynx 2.8.6_dev13
lynx lynx 2.8.5 dev.10
openpkg openpkg current
gentoo linux *
mandrakesoft mandrake linux corporate server 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
mandrakesoft mandrake linux 10.1
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
mandrakesoft mandrake multi network firewall 2.0
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 2006
openpkg openpkg 2.5
mandrakesoft mandrake linux 10.1
mandrakesoft mandrake linux 2006
mandrakesoft mandrake linux corporate server 3.0
mandrakesoft mandrake linux corporate server 2.1