Vulnerability Name: | CVE-2005-3120 (CCN-22755) | ||||||||||||||||||||||||||||
Assigned: | 2005-10-17 | ||||||||||||||||||||||||||||
Published: | 2005-10-17 | ||||||||||||||||||||||||||||
Updated: | 2018-10-19 | ||||||||||||||||||||||||||||
Summary: | Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and earlier allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
References: | Source: SCO Type: UNKNOWN SCOSA-2006.7 Source: SCO Type: UNKNOWN SCOSA-2005.47 Source: MITRE Type: CNA CVE-2005-3120 Source: FULLDISC Type: Patch, Vendor Advisory 20051017 Lynx Remote Buffer Overflow Source: TRUSTIX Type: UNKNOWN TSLSA-2005-0059 Source: CCN Type: Lynx Web site Lynx Information Source: CCN Type: RHSA-2005-803 lynx security update Source: SECUNIA Type: UNKNOWN 17150 Source: CCN Type: SA17216 Lynx "HTrjis()" NNTP Buffer Overflow Vulnerability Source: SECUNIA Type: UNKNOWN 17216 Source: SECUNIA Type: UNKNOWN 17230 Source: SECUNIA Type: UNKNOWN 17231 Source: SECUNIA Type: UNKNOWN 17238 Source: SECUNIA Type: UNKNOWN 17248 Source: SECUNIA Type: UNKNOWN 17340 Source: SECUNIA Type: UNKNOWN 17360 Source: SECUNIA Type: UNKNOWN 17444 Source: SECUNIA Type: UNKNOWN 17445 Source: SECUNIA Type: UNKNOWN 17480 Source: SECUNIA Type: UNKNOWN 18376 Source: CCN Type: SA18584 Avaya S87XX/S8500/S8300 Lynx "HTrjis()" NNTP Buffer Overflow Source: SECUNIA Type: UNKNOWN 18584 Source: SECUNIA Type: UNKNOWN 20383 Source: CCN Type: SECTRACK ID: 1015065 Lynx Buffer Overflow in HTrjis() in Processing NNTP Headers Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1015065 Source: SLACKWARE Type: UNKNOWN SSA:2005-310-03 Source: CONFIRM Type: UNKNOWN http://support.avaya.com/elmodocs2/security/ASA-2006-010.htm Source: CCN Type: ASA-2006-010 lynx security update (RHSA-2005-803) Source: CCN Type: ASA-2006-030 Lynx NNTP Buffer Overflow Vulnerability in UnixWare (SCOSA-2005.47) Source: DEBIAN Type: UNKNOWN DSA-874 Source: DEBIAN Type: UNKNOWN DSA-876 Source: DEBIAN Type: UNKNOWN DSA-1085 Source: DEBIAN Type: DSA-1085 lynx-cur -- several vulnerabilities Source: DEBIAN Type: DSA-874 lynx -- buffer overflow Source: DEBIAN Type: DSA-876 lynx-ssl -- buffer overflow Source: CCN Type: GLSA-200510-15 Lynx: Buffer overflow in NNTP processing Source: GENTOO Type: UNKNOWN GLSA-200510-15 Source: MANDRIVA Type: UNKNOWN MDKSA-2005:186 Source: SUSE Type: UNKNOWN SUSE-SR:2005:025 Source: CCN Type: OpenPKG-SA-2005.026 Lynx Source: OPENPKG Type: UNKNOWN OpenPKG-SA-2005.026 Source: REDHAT Type: Vendor Advisory RHSA-2005:803 Source: FEDORA Type: UNKNOWN FLSA:152832 Source: BUGTRAQ Type: UNKNOWN 20060602 Re: [SECURITY] [DSA 1085-1] New lynx-cur packages fix several vulnerabilities Source: BID Type: UNKNOWN 15117 Source: CCN Type: BID-15117 Lynx NNTP Article Header Buffer Overflow Vulnerability Source: CCN Type: USN-206-1 Lynx vulnerability Source: CCN Type: USN-206-2 Fixed lynx packages for USN-206-1 Source: MISC Type: Vendor Advisory https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170253 Source: XF Type: UNKNOWN lynx-htrjis-bo(22755) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:9257 Source: UBUNTU Type: UNKNOWN USN-206-1 Source: SUSE Type: SUSE-SR:2005:025 SUSE Security Summary Report | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: ![]() | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |