CVE-2005-2929
Summary
| CVE | CVE-2005-2929 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2005-11-18 06:03:00 UTC |
| Updated | 2018-10-19 15:34:00 UTC |
| Description | Lynx 2.8.5, and other versions before 2.8.6dev.15, allows remote attackers to execute arbitrary commands via (1) lynxcgi:, (2) lynxexec, and (3) lynxprog links, which are not properly restricted in the default configuration in some environments. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Secunia - Advisories - Mandriva update for lynx |
SECUNIA |
secunia.com |
Vendor Advisory |
| Secunia - Advisories - UnixWare update for lynx |
SECUNIA |
secunia.com |
Vendor Advisory |
| Secunia - Advisories - Lynx "lynxcgi:" URI Handler Arbitrary Command Execution |
SECUNIA |
secunia.com |
Vendor Advisory |
| Gentoo Linux Documentation
--
Lynx: Arbitrary command execution |
GENTOO |
www.gentoo.org |
|
| Lynx 'lynxcgt:' Handler Configuration Bug Lets Remote Users Execute Arbitrary Commands - SecurityTracker |
SECTRACK |
securitytracker.com |
|
| Public Advisory: 11.11.05 // iDefense Labs |
IDEFENSE |
www.idefense.com |
Patch, Vendor Advisory |
| Advisories - Mandriva Linux |
MANDRIVA |
www.mandriva.com |
|
| IBM X-Force Exchange |
XF |
exchange.xforce.ibmcloud.com |
|
| Secunia - Advisories - Avaya Intuity Audix Lynx Arbitrary Command Execution |
SECUNIA |
secunia.com |
Vendor Advisory |
| SCOSA-2006.7 |
SCO |
ftp.sco.com |
|
| Secunia - Advisories - SCO OpenServer update for lynx |
SECUNIA |
secunia.com |
Vendor Advisory |
| Webmail - OVH |
VUPEN |
www.vupen.com |
Vendor Advisory |
| Secunia - Advisories - Gentoo update for lynx |
SECUNIA |
secunia.com |
Vendor Advisory |
| Repository / Oval Repository |
OVAL |
oval.cisecurity.org |
|
| Multiple Vendor Lynx Command Injection Vulnerability - CXSecurity.com |
SREASON |
securityreason.com |
|
| SecurityFocus |
FEDORA |
www.securityfocus.com |
|
| Secunia - Advisories - Trustix update for multiple packages |
SECUNIA |
secunia.com |
Vendor Advisory |
| Secunia - Advisories - SGI Advanced Linux Environment Multiple Updates |
SECUNIA |
secunia.com |
Vendor Advisory |
| Lynx URI Handlers Arbitrary Command Execution Vulnerability |
BID |
www.securityfocus.com |
|
| Secunia - Advisories - Red Hat update for lynx |
SECUNIA |
secunia.com |
Vendor Advisory |
| rhn.redhat.com | Red Hat Support |
REDHAT |
www.redhat.com |
|
| OpenPKG Project: Security: Security Advisories |
OPENPKG |
www.openpkg.org |
|
| 1. Overview: |
CONFIRM |
support.avaya.com |
|
| SCOSA-2005.55 |
SCO |
ftp.sco.com |
|
| Fedora update for lynx - Advisories - Secunia |
SECUNIA |
secunia.com |
Vendor Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|
| Red Hat | 2007-03-14 | Mark J Cox | Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. |
There are currently no legacy QID mappings associated with this CVE.