CVE-2005-3120
Summary
| CVE | CVE-2005-3120 |
|---|---|
| State | PUBLISHED |
| Assigner | debian |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2005-10-17 20:06:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and earlier allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters. |
Risk And Classification
Primary CVSS: v3.1 9.8 CRITICAL from [email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Problem Types: CWE-131 | n/a
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 9.8 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| 2.0 | [email protected] | Primary | 7.5 | AV:N/AC:L/Au:N/C:P/I:P/A:P |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:L/Au:N/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Debian | Debian Linux | 3.0 | All | All | All |
| Operating System | Debian | Debian Linux | 3.1 | All | All | All |
| Application | Invisible-island | Lynx | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Security Announcement | af854a3a-2127-422b-91ae-364da2661108 | www.novell.com | Broken Link |
| ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.47/SCOSA-2005.47.txt | af854a3a-2127-422b-91ae-364da2661108 | ftp.sco.com | Broken Link |
| Secunia - Advisories - Ubuntu update for lynx | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link |
| The Slackware Linux Project: Slackware Security Advisories | af854a3a-2127-422b-91ae-364da2661108 | slackware.com | Broken Link |
| OpenPKG Project: Security: Security Advisories | af854a3a-2127-422b-91ae-364da2661108 | www.openpkg.org | Broken Link |
| Lynx NNTP Article Header Buffer Overflow Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Broken Link, Third Party Advisory, VDB Entry |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | Broken Link, Vendor Advisory |
| Secunia - Advisories - SUSE Updates for Multiple Packages | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link |
| Secunia - Advisories - Debian update for lynx | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link |
| Secunia - Advisories - Gentoo update for lynx | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link |
| USN-206-1: Lynx vulnerability | Ubuntu security notices | af854a3a-2127-422b-91ae-364da2661108 | usn.ubuntu.com | Broken Link |
| Secunia - Advisories - Debian update for lynx-ssl | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link |
| Secunia - Advisories - Avaya S87XX/S8500/S8300 Lynx "HTrjis()" NNTP Buffer Overflow | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link |
| 170253 – (CVE-2005-3120) CAN-2005-3120 lynx buffer overflow | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.redhat.com | Issue Tracking |
| Debian update for lynx-cur - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link |
| Secunia - Advisories - Mandriva update for lynx | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Broken Link, Third Party Advisory, VDB Entry |
| Debian -- Security Information -- DSA-874-1 lynx | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | Mailing List, Third Party Advisory |
| [Full-disclosure] Lynx Remote Buffer Overflow | af854a3a-2127-422b-91ae-364da2661108 | lists.grok.org.uk | Broken Link, Patch, Vendor Advisory |
| Secunia - Advisories - Slackware update for lynx | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link |
| Gentoo Linux Documentation -- Lynx: Buffer overflow in NNTP processing | af854a3a-2127-422b-91ae-364da2661108 | www.gentoo.org | Third Party Advisory |
| Secunia - Advisories - Red Hat update for lynx | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link |
| Secunia - Advisories - Fedora update for lynx | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link |
| TSLSA-2005-0059 - multi | af854a3a-2127-422b-91ae-364da2661108 | lists.trustix.org | Broken Link |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | Broken Link |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Broken Link, Third Party Advisory, VDB Entry |
| Secunia - Advisories - SCO OpenServer update for lynx | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link |
| ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.7/SCOSA-2006.7.txt | af854a3a-2127-422b-91ae-364da2661108 | ftp.sco.com | Broken Link |
| SecurityTracker.com Archives - Lynx Buffer Overflow in HTrjis() in Processing NNTP Headers Lets Remote Users Execute Arbitrary Code | af854a3a-2127-422b-91ae-364da2661108 | securitytracker.com | Broken Link, Third Party Advisory, VDB Entry |
| Debian -- Security Information -- DSA-876-1 lynx-ssl | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | Mailing List, Third Party Advisory |
| Secunia - Advisories - Lynx "HTrjis()" NNTP Buffer Overflow Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link |
| Secunia - Advisories - UnixWare update for lynx | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link |
| 1. Overview: | af854a3a-2127-422b-91ae-364da2661108 | support.avaya.com | Third Party Advisory |
| Advisories - Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | Third Party Advisory |
| Debian -- Security Information -- DSA-1085-1 lynx-cur | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | Mailing List, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|---|---|---|
| Red Hat | 2007-03-14 | Mark J Cox | Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. |
There are currently no legacy QID mappings associated with this CVE.