Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2003:023: lynx

Vulnerability Assessment Details

MDKSA-2003:023: lynx

Vulnerability Assessment Summary
Check for the version of the lynx package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2003:023 (lynx).

A vulnerability was discovered in lynx, a text-mode web browser. The HTTP
queries that lynx constructs are from arguments on the command line or the
$WWW_HOME environment variable, but lynx does not properly sanitize special
characters such as carriage returns or linefeeds. Extra headers can be inserted
into the request because of this, which can cause scripts that use lynx to fetch
data from the wrong site from servers that use virtual hosting.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Apple MacBook Air 13" Intel Core i5 8G RAM 256GB SSD - Latest 2017/Cycle Count 5
Apple MacBook Air 13Apple MacBook 8,1 12" Intel Core M @ 1.2GHz 512GB SSD 8GB RAM (Early-2015)
Apple MacBook 8,1 12Microsoft Surface Pro 4 256GB, Wi-Fi, 12.3in - Silver (Intel Core i5 - 8 GB RAM)
Microsoft Surface Pro 4 256GB, Wi-Fi, 12.3in - Silver (Intel Core i5 - 8 GB RAM) pictureHP ProBook 650 G3 Core i5-7200U 500GB 8GB 15.6" (1920x1080) Windows 10 Pro
HP ProBook 650 G3 Core i5-7200U 500GB 8GB 15.6


No Discussions have been posted on this vulnerability.