Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA1228] DSA-1228-1 elinks


Vulnerability Assessment Details

[DSA1228] DSA-1228-1 elinks

Vulnerability Assessment Summary
DSA-1228-1 elinks

Detailed Explanation for this Vulnerability Assessment

Teemu Salmela discovered that the elinks character mode web browser
performs insufficient sanitising of smb:// URIs, which might lead to the
execution of arbitrary shell commands.
For the stable distribution (sarge) this problem has been fixed in
version 0.10.4-7.1.
For the upcoming stable distribution (etch) this problem has been
fixed in version 0.11.1-1.2.
For the unstable distribution (sid) this problem has been fixed in
version 0.11.1-1.2.
We recommend that you upgrade your elinks package.


Solution : http://www.debian.org/security/2006/dsa-1228
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi

Cables, Connectors

1PC Intel Xeon E5504 Quad Core 2.0GHz/4M/4.80 SLBF9 Socket LGA1366 CPU
$0.99
1PC Intel Xeon E5504 Quad Core 2.0GHz/4M/4.80 SLBF9 Socket LGA1366 CPU pictureIntel SLBUD Core i3-550 3.20GHz 4M 1st Gen Socket 1156 Dual Core CPU / Processor
$22.95
Intel SLBUD Core i3-550 3.20GHz 4M 1st Gen Socket 1156 Dual Core CPU / Processor pictureIntel i5-750 2.66GHz/8M Socket 1156 Quad CPU Processor LGA1156
$35.0
Intel i5-750 2.66GHz/8M Socket 1156 Quad CPU Processor LGA1156 picture1PC Intel Xeon E5540 SLBF6 LGA 1366 2.53 GHz 5.86 GT/s Quad-Core CPU Processor
$0.99
1PC Intel Xeon E5540 SLBF6 LGA 1366 2.53 GHz 5.86 GT/s Quad-Core CPU Processor picture


Discussions

No Discussions have been posted on this vulnerability.